Literatura académica sobre el tema "Intermediary of of personal information"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Intermediary of of personal information".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Intermediary of of personal information"
Asunka, Anna. "Internet Service Providers and Intermediary Liabilities". Advances in Multidisciplinary and scientific Research Journal Publication 1, n.º 1 (23 de julio de 2022): 113–18. http://dx.doi.org/10.22624/aims/crp-bk3-p19.
Texto completoMarotta, Veronica, Yue Wu, Kaifu Zhang y Alessandro Acquisti. "The Welfare Impact of Targeted Advertising Technologies". Information Systems Research 33, n.º 1 (marzo de 2022): 131–51. http://dx.doi.org/10.1287/isre.2021.1024.
Texto completoTaylor, Robert S. "Question-Negotiation and Information Seeking in Libraries". College & Research Libraries 76, n.º 3 (1 de marzo de 2015): 251–67. http://dx.doi.org/10.5860/crl.76.3.251.
Texto completoWang, Shu, Tsongming Lin y Yingkai Liao. "The Intermediary Effect of Attachment Behavior in Live Streaming Marketing". Modern Economics & Management Forum 3, n.º 4 (14 de septiembre de 2022): 262. http://dx.doi.org/10.32629/memf.v3i4.1023.
Texto completoKusumawardani, Saskia, Sinta Dewi Rosadi y Elisatris Gultom. "GOOD CORPORATE GOVERNANCE PRINCIPLES ON INTERNET INTERMEDIARY COMPANIES IN PROTECTING THE PRIVACY OF PERSONAL DATA IN INDONESIA". Yustisia Jurnal Hukum 9, n.º 1 (6 de mayo de 2020): 65. http://dx.doi.org/10.20961/yustisia.v9i1.39683.
Texto completoKoehler, Karl A. "Inducing phase transitions in local innovation networks: Implications for state economic development". Local Economy: The Journal of the Local Economy Policy Unit 32, n.º 8 (7 de noviembre de 2017): 854–66. http://dx.doi.org/10.1177/0269094217739370.
Texto completoKARAKURT, Yağmur. "The Moderation Role of Need of Social Acceptance on the Relationships between Gender Roles and Sexual Quality". International Journal of Psychology and Educational Studies 9, n.º 2 (26 de marzo de 2022): 479–91. http://dx.doi.org/10.52380/ijpes.2022.9.2.740.
Texto completoHegarty, Rosaleen, Tom Lunney, Kevin Curran y Maurice Mulvenna. "Ambient Interface Design (AID) for the Ergonomically Challenged". International Journal of Ambient Computing and Intelligence 2, n.º 2 (abril de 2010): 57–64. http://dx.doi.org/10.4018/jaci.2010040104.
Texto completoGiglio, Ferdinando. "Crowdfunding: An Alternative Method to Invest". International Business Research 15, n.º 3 (31 de enero de 2022): 13. http://dx.doi.org/10.5539/ibr.v15n3p13.
Texto completoHendricks-Sturrup, Rachele M. y Christine Y. Lu. "What motivates the sharing of consumer-generated genomic information?" SAGE Open Medicine 8 (enero de 2020): 205031212091540. http://dx.doi.org/10.1177/2050312120915400.
Texto completoTesis sobre el tema "Intermediary of of personal information"
Katule, Ntwa. "Utilization of personal health informatics through intermediary users". Doctoral thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29358.
Texto completoLUCHETTA, GIACOMO. "Antitrust and regulation in the European Union: selected topics". Doctoral thesis, Luiss Guido Carli, 2013. http://hdl.handle.net/11385/200830.
Texto completoGartner, R. "Intermediary XML schemas". Thesis, City, University of London, 2018. http://openaccess.city.ac.uk/20288/.
Texto completoKo, Leonard L. "Personal information system /". Online version of thesis, 1993. http://hdl.handle.net/1850/11976.
Texto completoSingh, Gurvinder. "Detection of intermediary hosts through TCP latency propagation". Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9029.
Texto completoToday people from all lifestyles, government officials, researchers and executives use internet. The people start to depend on internet for their daily life. However, the increased dependence comes with a great risk. The popularity and potential of internet attracts users with illegal intentions as well. The attackers generally establish a connection chain by logging in to a number of intermediary hosts before launching an attack at the victim host. These intermediary hosts are called as stepping-stones. On the victim side, it becomes hard to detect that the peer communicating with the victim is whether a real originator of the connection or it is merely acting as an intermediary host in the connection chain. This master dissertation proposed an approach based on Interarrival packet time to distinguish an incoming connection from a connection coming via some intermediary hosts. The proposed approach uses information available at the receiving end and applicable to encrypted traffic too. The approach was successfully tested for SSH, Telnet, FTP, HTTP and SMTP protocols and implemented in to an intrusion detection system for corresponding protocols. The main applications for the proposed approach are Manual intrusion detection, Tor usage detection and Spam messages detection. The approach is also applicable for the digital forensics investigations. Keywords : Network security, Stepping stone detection, Manual intrusion detection, Tor usage detection, Spam detection and Digital forensics investigation.
Honda, Jun. "Intermediary Search for Suppliers in Procurement Auctions". WU Vienna University of Economics and Business, 2015. http://epub.wu.ac.at/4628/1/wp203.pdf.
Texto completoSeries: Department of Economics Working Paper Series
Layouni, Mohamed. "Privacy-preserving personal information management". Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.
Texto completoIn this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
McNeill, Allan. "Semantic structure of personal information". Thesis, Connect to e-thesis, 2002. http://theses.gla.ac.uk/840/.
Texto completoPh.D. thesis submitted to the Department of Psychology, University of Glasgow, 2002. Includes bibliographical references. Print version also available.
Nelwamondo, Murendeni. "The role of intermediaries in information sharing between government and communities in Western Cape". University of the Western Cape, 2021. http://hdl.handle.net/11394/8293.
Texto completoThe use of Information and Communication Technology (ICT) to share information is rapidly increasing worldwide. The South African government uses ICT to extend sharing of information and provide services to communities through websites, portals, forums and other online platforms. However, there are still digitally divided communities – without access it these ICTs due to, among others, a lack of necessary computer skills and financial resources. Consequently, these communities miss opportunities to use ICTs to share information with the government. To address the digitally divided communities, the government established an initiative to build community ICT access centres (e-centres). These e-centres have become the intermediaries between government and communities as shared community facilities that provide access to ICTs and connect the digitally divided communities to government services with social and economic benefits. However, there seem to be disparities between the government's roles and the eventual roles played by intermediaries in information sharing between communities and the government. The disparity might lead to intermediaries not providing services expected by communities, which might affect how communities use intermediaries to communicate with the government.
Franz, Thomas [Verfasser]. "Semantic Personal Information Management / Thomas Franz". München : Verlag Dr. Hut, 2010. http://d-nb.info/1009972243/34.
Texto completoLibros sobre el tema "Intermediary of of personal information"
Ingwersen, Peter. Information retrieval interaction: Design variables and intermediary functionality. Copenhagen: Royal School of Librarianship, 1992.
Buscar texto completoWaldfogel, Joel. Does information undermine brand?: Information intermediary use and preference for branded web retailers. Cambridge, MA: National Bureau of Economic Research, 2003.
Buscar texto completoAnderson, Ross, ed. Personal Medical Information. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/978-3-642-59023-8.
Texto completoEtzel, Barbara y Peter Thomas. Personal Information Management. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8.
Texto completoAllen, Bryce. Bibliographic and text-linguistic schemata in the user-intermediary interaction. Ottawa: National Library of Canada, 1989.
Buscar texto completoOregon. Division of Finance and Corporate Securities., ed. Protecting your personal information. [Salem, Or.]: Dept. of Consumer & Business Services, Division of Finance and Corporte Securities, 2007.
Buscar texto completoAccess to personal information. Sydney, N.S.W: New South Wales Law Reform Commission, 2010.
Buscar texto completoCouncil, Learning and Skills. The Role of intermediary agencies in promoting information advice and guidance in the workplace. Coventry: LSC, 2003.
Buscar texto completoD, Naumann Justus, ed. Personal productivity with information technology. New York, N.Y: McGraw-Hill Companies, Inc., 1997.
Buscar texto completoWebb, Sylvia P. Personal development in information work. 2a ed. London: Aslib, 1991.
Buscar texto completoCapítulos de libros sobre el tema "Intermediary of of personal information"
Yu, Wenli, Li Li, Jingyuan Wang, Dengbao Wang, Yong Wang, Zhanbo Yang y Min Huang. "Learning Intermediary Category Labels for Personal Recommendation". En Web and Big Data, 124–32. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63564-4_10.
Texto completoKing, Chris. "Personal Information". En Advanced BlackBerry 6 Development, 189–232. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3211-7_6.
Texto completoByon, Andrew Sangpil. "Personal information". En Modern Korean Grammar Workbook, 255–57. New York : Routledge-Taylor & Francis Group, [2017] | Series: Routledge Modern Grammars: Routledge, 2017. http://dx.doi.org/10.4324/9781315178158-63.
Texto completoKing, Chris. "Personal Information". En Advanced BlackBerry Development, 195–239. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-2657-4_6.
Texto completoWallwork, Adrian. "Personal Information". En English for Academic Research, 33–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11090-1_3.
Texto completovan der Burg, Martijn. "Intermediary Bodies of Governance". En Napoleonic Governance in the Netherlands and Northwest Germany, 67–91. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66658-3_4.
Texto completoEtzel, Barbara y Peter Thomas. "Personal information management". En Personal Information Management, 8–17. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_2.
Texto completoLee, Newton. "Personal Information Management". En Facebook Nation, 159–68. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5308-6_12.
Texto completoEtzel, Barbara y Peter Thomas. "‘Information overload’ and information management ‘re-engineering’". En Personal Information Management, 25–31. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_4.
Texto completoKauffman, Robert J., T. S. Raghu y Matt Sopha. "Producer-Intermediary Relationships in the Long Tail". En Lecture Notes in Business Information Processing, 105–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17449-0_10.
Texto completoActas de conferencias sobre el tema "Intermediary of of personal information"
Meissner, Fritz y Edwin Blake. "Understanding culturally distant end-users through intermediary-derived personas". En the South African Institute of Computer Scientists and Information Technologists Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2072221.2072266.
Texto completoMaungwa, Tumelo y Ina Fourie. "How experiences reported on intermediary information seeking from inter-disciplinary contexts can inform a study on competitive intelligence professionals". En ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2023.
Texto completoGallup, Lloyd, Jay McCormack, Steven Beyerlein y Edwin Odom. "Rationale and Methodology for Deploying Axiomatic Design in Interdisciplinary Capstone Design Courses". En ASME 2008 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/detc2008-49885.
Texto completoYamakami, Toshihiko. "Open intermediary analysis in mobile data services: Shift from closed to open intermediary services". En 2010 3rd International Conference on Information Sciences and Interaction Sciences (ICIS). IEEE, 2010. http://dx.doi.org/10.1109/icicis.2010.5534769.
Texto completoPeter, Cruickshank, Gemma Webster y Frances Ryan. "Assisting information practice: from information intermediary to digital proxy". En ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2017.
Texto completoTakizawa, Yui, Kazutaka Tsuji y Tatsuhiro Yonekura. "How to Encourage Intermediary on Social Media". En 2012 15th International Conference on Network-Based Information Systems (NBiS). IEEE, 2012. http://dx.doi.org/10.1109/nbis.2012.102.
Texto completoSong, Xiaoyu, Lianzhong Liu, Chunfang Li y Zhouyang Li. "A CRM-oriented model for evaluating intermediary". En 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference (ITAIC). IEEE, 2014. http://dx.doi.org/10.1109/itaic.2014.7065100.
Texto completoHu, Jianping. "Training Needs Analysis of Talent Intermediary Organization Based on Goldstein Model - A Case Study of a Talent Intermediary Organization". En 2011 International Conference on Information Technology, Computer Engineering and Management Sciences (ICM). IEEE, 2011. http://dx.doi.org/10.1109/icm.2011.42.
Texto completoAlijani, Reza, Siddhartha Banerjee, Kamesh Munagala y Kangning Wang. "The Limits of an Information Intermediary in Auction Design". En EC '22: The 23rd ACM Conference on Economics and Computation. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3490486.3538370.
Texto completoXiaoping, Wu. "PROBLEMS, TASKS AND COUNTERMEASURES FOR TEACHING SECONDARY WRITING BASED ON CHINESE PROFICIENCY GRADING STANDARDS — FROM THE PERSPECTIVE OF MEMETI". En Chinese Studies in the 21st Century. Buryat State University Publishing Department, 2022. http://dx.doi.org/10.18101/978-5-9793-1802-8-2022-52-59.
Texto completoInformes sobre el tema "Intermediary of of personal information"
Waldfogel, Joel y Lu Chen. Does Information Undermine Brand? Information Intermediary Use and Preference for Branded Web Retailers. Cambridge, MA: National Bureau of Economic Research, septiembre de 2003. http://dx.doi.org/10.3386/w9942.
Texto completoGarfinkel, Simson L. De-identification of personal information. National Institute of Standards and Technology, octubre de 2015. http://dx.doi.org/10.6028/nist.ir.8053.
Texto completoNystrom, M., S. Parkinson, A. Rusch y M. Scott. PKCS #12: Personal Information Exchange Syntax v1.1. Editado por K. Moriarty. RFC Editor, julio de 2014. http://dx.doi.org/10.17487/rfc7292.
Texto completoHelton-Fauth, Whitney B. Privacy Concerns Related to the Collection of Personal Information Under the Personal Identify Verification (PIV) Program. Fort Belvoir, VA: Defense Technical Information Center, marzo de 2008. http://dx.doi.org/10.21236/ada477739.
Texto completoForsdick, Harry C. y Robert H. Thomas. Research in Distributed Personal Computer-Based Information Systems. Volume 1. Fort Belvoir, VA: Defense Technical Information Center, agosto de 1988. http://dx.doi.org/10.21236/ada203780.
Texto completoForsdick, Harry C. y Robert H. Thomas. Research in Distributed Personal Computer-Based Information Systems. Volume 2. Fort Belvoir, VA: Defense Technical Information Center, agosto de 1988. http://dx.doi.org/10.21236/ada203845.
Texto completoBukhari, Hanan, Kelly Weathers y Barbara Frazier. Information-seeking and Personal Capital in Novice Learners' Creative Design Approach. Ames: Iowa State University, Digital Repository, noviembre de 2016. http://dx.doi.org/10.31274/itaa_proceedings-180814-1450.
Texto completoBridges, W. M. y Harld L. Frohman. An Electronic Data Interchange Prototype for Exchanging Personal Property Shipment Information. Fort Belvoir, VA: Defense Technical Information Center, marzo de 1992. http://dx.doi.org/10.21236/ada260908.
Texto completoHasty, III y Thomas J. Protection of Personal Privacy Interests under the Freedom of Information Act. Fort Belvoir, VA: Defense Technical Information Center, junio de 1991. http://dx.doi.org/10.21236/ada242183.
Texto completoMcGregor-Lowndes, Myles, Marie Balczun y Alexandra Williamson. Ancillary Funds 2000–2019: ACPNS Current Issues Information Sheet 2021-1. Queensland University of Technology, julio de 2021. http://dx.doi.org/10.5204/rep.eprints.211850.
Texto completo