Thèses sur le sujet « Intermediary of of personal information »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Intermediary of of personal information.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Intermediary of of personal information ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

Katule, Ntwa. « Utilization of personal health informatics through intermediary users ». Doctoral thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29358.

Texte intégral
Résumé :
Personal informatics are important tools in health self-management as they support individuals to quantify and self-reflect on their lifestyle. Human-computer interaction researchers have devoted resources on studying how to design such tools. Various motivational strategies have been explored for their capabilities in improving user engagement. However, such strategies are developed with an assumption that the targeted consumer of information is the one directly manipulating user interfaces of the system that has information. This may not always be the case for users in developing regions. As a result, such systems may not scale well in contexts where a targeted consumer (beneficiary) may use technology through the facilitation of another person (intermediary) whom is responsible for manipulating user interfaces, because such facilitators are not recognized as part of the system, hence motivational strategies don't cater for them. In order to uncover design implications for intermediated technology use in the context of personal health informatics (PHI), the researcher started with the theoretical framing of the work followed by a contextual enquiry which led to development of mobile applications' prototypes for tracking nutrition and physical activity. Evaluation of the prototypes revealed that a familial relationship is a prerequisite for such an intervention. The most promising combination involves family members, possibly a child and a parent working together. The study used self-determination theory to understand how a collaborative gamified system can increase engagement. The result revealed that gamification as the source of a significant increase in perceived competence in intermediary users whom also tended to consider themselves as co-owners of the interaction experience. Therefore, gamification was found to be a catalyst for increasing collaboration between an intermediary and beneficiary user of technology, provided that the two users that formed a pair had a prior social relationship. In the absence of gamification, intermediary users tended to be less engaged in the intervention. The study highlights both the positive and negative aspects of gamification in promoting collaboration in intermediated use and its general implications in health settings. Design considerations required in order to improve the overall user experience of both users involved are proposed. In general, this work contributes to both theory and empirical validation of factors for, supporting proximate-enabled intermediated use of personal health informatics.
Styles APA, Harvard, Vancouver, ISO, etc.
2

LUCHETTA, GIACOMO. « Antitrust and regulation in the European Union : selected topics ». Doctoral thesis, Luiss Guido Carli, 2013. http://hdl.handle.net/11385/200830.

Texte intégral
Résumé :
With the Communication on Smart Regulation issued in October 2010, the European Commission tried to foster a better management of the whole policy cycle. According to that Communication, amending policy proposals must be preceded by an ex post assessment of the current situation, allowing ―closing the policy cycle‖. This paper tries to answer the question whether the EU Impact Assessments System is fit to steer and close the policy cycle, and what is the relation between ex ante IA and ex post evaluations ―on the ground‖ so far. This is done via a macro and micro analysis, based on scorecard approach and three case studies, comparing the EU IA system performance with a theoretical benchmark derived from the EU policy document and process. The paper concludes that the EU Impact Assessment system, as it is currently designed and implemented, it is not yet fit to steer and close the policy cycle. To achieve this goal, all the analytical and empirical layers of the policy cycle should be fully dealt with since the ex ante phase.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Gartner, R. « Intermediary XML schemas ». Thesis, City, University of London, 2018. http://openaccess.city.ac.uk/20288/.

Texte intégral
Résumé :
The methodology of intermediary XML schemas is introduced and its application to complex metadata environments is explored. Intermediary schemas are designed to mediate to other ‘referent’ schemas: instances conforming to these are not generally intended for dissemination but must usually be realized by XSLT transformations for delivery. In some cases, these schemas may also generate instances conforming to themselves. Three subsidiary methods of this methodology are introduced. The first is application-specific schemas that act as intermediaries to established schemas which are problematic by virtue of their over-complexity or flexibility. The second employs the METS packaging standard as a template for navigating instances of a complex schema by defining an abstract map of its instances. The third employs the METS structural map to define templates or conceptual models from which instances of metadata for complex applications may be realized by XSLT transformations. The first method is placed in the context of earlier approaches to semantic interoperability such as crosswalks, switching across, derivation and application profiles. The second is discussed in the context of such methods for mapping complex objects as OAI-ORE and the Fedora Content Model Architecture. The third is examined in relation to earlier approaches to templating within XML architectures. The relevance of these methods to contemporary research is discussed in three areas: digital ecosystems, archival description and Linked Open Data in digital asset management and preservation. Their relevance to future research is discussed in the form of suggested enhancements to each, a possible synthesis of the second and third to overcome possible problems of interoperability presented by the first, and their potential role in future developments in digital preservation. This methodology offers an original approach to resolving issues of interoperability and the management of complex metadata environments; it significantly extends earlier techniques and does so entirely within XML architectures.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ko, Leonard L. « Personal information system / ». Online version of thesis, 1993. http://hdl.handle.net/1850/11976.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Singh, Gurvinder. « Detection of intermediary hosts through TCP latency propagation ». Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9029.

Texte intégral
Résumé :

Today people from all lifestyles, government officials, researchers and executives use internet. The people start to depend on internet for their daily life. However, the increased dependence comes with a great risk. The popularity and potential of internet attracts users with illegal intentions as well. The attackers generally establish a connection chain by logging in to a number of intermediary hosts before launching an attack at the victim host. These intermediary hosts are called as stepping-stones. On the victim side, it becomes hard to detect that the peer communicating with the victim is whether a real originator of the connection or it is merely acting as an intermediary host in the connection chain. This master dissertation proposed an approach based on Interarrival packet time to distinguish an incoming connection from a connection coming via some intermediary hosts. The proposed approach uses information available at the receiving end and applicable to encrypted traffic too. The approach was successfully tested for SSH, Telnet, FTP, HTTP and SMTP protocols and implemented in to an intrusion detection system for corresponding protocols. The main applications for the proposed approach are Manual intrusion detection, Tor usage detection and Spam messages detection. The approach is also applicable for the digital forensics investigations. Keywords : Network security, Stepping stone detection, Manual intrusion detection, Tor usage detection, Spam detection and Digital forensics investigation.

Styles APA, Harvard, Vancouver, ISO, etc.
6

Honda, Jun. « Intermediary Search for Suppliers in Procurement Auctions ». WU Vienna University of Economics and Business, 2015. http://epub.wu.ac.at/4628/1/wp203.pdf.

Texte intégral
Résumé :
In many procurement auctions, entrants determine whether to participate in auctions accounting for their roles of intermediaries who search for the best (or the cheapest) input suppliers. We build on a procurement auction model with entry, combining with intermediary search for suppliers. The novel feature is that costs of bidders are endogenously determined by suppliers who strategically charge input prices. We show the existence of an equilibrium with price dispersion for inputs, generating cost heterogeneity among bidders. Interestingly, the procurement cost may rise as the number of potential bidders increases. (author's abstract)
Series: Department of Economics Working Paper Series
Styles APA, Harvard, Vancouver, ISO, etc.
7

Layouni, Mohamed. « Privacy-preserving personal information management ». Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.

Texte intégral
Résumé :
The spread of Information and Communication Technologies (ICTs) has transformed the way we deliver services, and has made them in general more efficient and more accessible to users. With these improvements however came new challenges. The extensive use of electronic services in our daily life, and the massive gathering of transactional data have led to serious privacy violations.
In this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
Styles APA, Harvard, Vancouver, ISO, etc.
8

McNeill, Allan. « Semantic structure of personal information ». Thesis, Connect to e-thesis, 2002. http://theses.gla.ac.uk/840/.

Texte intégral
Résumé :
Thesis (Ph.D.) - University of Glasgow, 2002.
Ph.D. thesis submitted to the Department of Psychology, University of Glasgow, 2002. Includes bibliographical references. Print version also available.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Nelwamondo, Murendeni. « The role of intermediaries in information sharing between government and communities in Western Cape ». University of the Western Cape, 2021. http://hdl.handle.net/11394/8293.

Texte intégral
Résumé :
Masters of Commerce
The use of Information and Communication Technology (ICT) to share information is rapidly increasing worldwide. The South African government uses ICT to extend sharing of information and provide services to communities through websites, portals, forums and other online platforms. However, there are still digitally divided communities – without access it these ICTs due to, among others, a lack of necessary computer skills and financial resources. Consequently, these communities miss opportunities to use ICTs to share information with the government. To address the digitally divided communities, the government established an initiative to build community ICT access centres (e-centres). These e-centres have become the intermediaries between government and communities as shared community facilities that provide access to ICTs and connect the digitally divided communities to government services with social and economic benefits. However, there seem to be disparities between the government's roles and the eventual roles played by intermediaries in information sharing between communities and the government. The disparity might lead to intermediaries not providing services expected by communities, which might affect how communities use intermediaries to communicate with the government.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Franz, Thomas [Verfasser]. « Semantic Personal Information Management / Thomas Franz ». München : Verlag Dr. Hut, 2010. http://d-nb.info/1009972243/34.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

Akbas, Mehmet. « Personal information search on mobile devices ». Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FAkbas.pdf.

Texte intégral
Résumé :
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2007.
Thesis Advisor(s): Singh, Gurminder ; Otani, Thomas. "September 2007." Description based on title screen as viewed on October 22, 2007. Includes bibliographical references (p. 83-87). Also available in print.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Liu, Jamie M. Eng Massachusetts Institute of Technology. « Customizable application for personal information management ». Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61172.

Texte intégral
Résumé :
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 83-84).
As digital content becomes increasingly pervasive in our daily lives, next-generation organizational tools must be developed to help end users curate that information. The information management tools available today are limited in several ways. They are either restrictive in how users define and organize their data, or they offer few options in how users can view and interact with that data. In this thesis, we introduce a new application geared toward the layman end user to help resolve this lack of personalization when managing data. With this tool, users can store any collection of information (i.e. to do lists, address book, DVD collection), customize how they want to view and browse that data, and create any number of visualizations for the same data set or overlapping sets of data. For example, a user might want to manage an address book for a collection of all contacts, and manage a different set of items involving all research-related items, including colleagues, in another visualization. This tool allows her to do this without duplicating the overlapping data set for contact information of colleagues, enabling her to make changes to an item in one visualization and see that change applied to any other visualization that includes the same item. Moreover, users can import data from other sources, as well as share their data with others either with a visualization, such that the receiver can interact with the visualization the user has already created, or as raw data, such that the receiver can create his or her own visualization of the data.
by Jamie Liu.
M.Eng.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Shi, Jiangpeng. « Wearable personal data information capture system ». ScholarWorks@UNO, 2004. http://louisdl.louislibraries.org/u?/NOD,172.

Texte intégral
Résumé :
Thesis (M.S.)--University of New Orleans, 2004.
Title from electronic submission form. "A thesis ... in partial fulfillment of the requirements for the degree of Master of Science in the Department of Computer Science."--Thesis t.p. Vita. Includes bibliographical references.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Gwizdka, Jacek, et Mark Chignell. « Individual Differences in Personal Information Management ». University of Washington Press, 2007. http://hdl.handle.net/10150/105751.

Texte intégral
Résumé :
In an increasingly complex world where people routinely handle large amounts of information, individuals are constantly challenged to manage and effectively use the information that they are responsible for. While email is the canonical example of an information overloading application, other well known PIM applications and tasks cited in earlier chapters of this book include maintaining addresses and contacts, scheduling, and organizing the various documents and bookmarks that one is interested in. Not surprisingly, there are individual differences (ID) in how, and how well, people cope with the challenge of personal information management. This greatly complicates any scientific analysis of PIM behavior. Thus, in addition to the evaluation methods discussed in the previous chapter, researchers and designers need to consider when and how individual differences should be included within parsimonious interpretations and explanations of PIM behavior. In this chapter we propose an approach where differences between individuals are considered last, after the influences of the environment and the task context have first been considered, and after group difference (e.g., between job classifications) have been investigated. We believe that this is a logical way to proceed, since like observing an ant walking over sand-dunes (cf. Simon, 1996) we should not ascribe complexities to an individual if they can instead be explained as due to properties of the environment. The goal of this chapter will be to review and synthesize some of the key findings in how PIM behavior differs between individuals. Some of the reasons why these differences occur and what can be done about them will also be discussed.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Penev, Alexander Computer Science &amp Engineering Faculty of Engineering UNSW. « Search in personal spaces ». Awarded by:University of New South Wales. Computer Science & ; Engineering, 2009. http://handle.unsw.edu.au/1959.4/44740.

Texte intégral
Résumé :
Technology surrounds us with many daily Search tasks. However, there is a fundamental difference---one of user familiarity and control---that differentiates between search tasks in impersonal and personal search spaces. The World Wide Web itself is largely unknown, unfamiliar and impersonal to a user. In contrast, users regularly search in more `personal' spaces, such as their own files, their web history, bookmarks, downloads, and so on. These spaces are personal because the user has more knowledge, familiarity and control over their content. A byproduct of these qualities is that search in personal spaces is typically navigational: to navigate through or to recover familiar information. This differs from web search, where very often a user is trying to discover new or unknown information. This important difference in search intent means that there are often few `correct' results for a query in personal spaces, which is something we must keep in mind when implementing search algorithms. This thesis leverages structure and metadata to build novel algorithms for improving search in several important personal search spaces: finding a file in a file hierarchy, website navigation on a mobile phone browser, tag-based search in an online bookmarking system, and sponsoring content on mobiles. The proposed methods are highly practical and applicable to current real-life search problems that affect millions of users.
Styles APA, Harvard, Vancouver, ISO, etc.
16

Khan, Imran. « Personal adaptive web agent for information filtering ». Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq23361.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Abrams, David. « Human factors of personal Web information spaces ». Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ51586.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Elsweiler, David. « Supporting human memory in personal information management ». Thesis, University of Strathclyde, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.488520.

Texte intégral
Résumé :
Personal Information Management (PIM) describes the processes by which an individual acquires, organises, and re-finds information. Studies have shown that people find PIM challenging and many struggle to manage the volume and diversity of information that they accumulate.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Keeble, Richard John. « An adaptive environment for personal information management ». Thesis, Brunel University, 1999. http://bura.brunel.ac.uk/handle/2438/6509.

Texte intégral
Résumé :
This dissertation reports the results of research into the provision of adaptive user interfaces to support individuals in the management of their personal information. Many individuals find that they have increased responsibility for managing aspects of their own lives, including the information associated with their jobs. In contrast with traditional approaches to information management, which are generally driven by organisational or business requirements, the requirements of personal information management systems tend to be less rigidly defined. This dissertation employs research from the areas of personal information management and adaptive user interfaces - systems which can monitor how they are used, and adapt on a personal level to their user - to address some of the particular requirements of personal information management systems. An adaptive user interface can be implemented using a variety of techniques, and this dissertation draws on research from the area of software agents to suggest that reactive software agents can be fruitfully applied to realise the required adaptivity. The reactive approach is then used in the specification and development of an adaptive interface which supports simple elements of personal information management tasks. The resulting application is evaluated by means of user trials and a usability inspection, and the theoretical architectures and techniques used in the specification and development of the software are critically appraised. The dissertation demonstrates an application of reactive software agents in adaptive systems design and shows how the behaviour of the system can be specified based on the analysis of some representative personal information management tasks.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Kelin, Sabra-Anne R. (Sabra-Anne Rachel) 1976. « Digital persona : a gateway to personal information ». Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/9461.

Texte intégral
Résumé :
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.
Includes bibliographical references (p. 101-103).
A Digital Persona (DP) is a gateway to a set of personal information, such as phone numbers and email addresses. Applications and devices which use personal information, such as electronic calendars and cellular phones, can manage this information by using a DP. Information which is accessible through a DP can be stored in the DP itself or in other applications. Since a DP facilitates the transfer of information between devices and applications, a DP can help solve many information management problems, such as handling data with different internal representations. The DP's structured, yet flexible, object model allows di-verse devices and applications to access and update information without being forced to adopt a common object model. This thesis discusses the design of the DP object model and API, as well as the DP's implementation. Implementation details which are covered include object-oriented techniques, reflection, and interfaces.
by Sabra-Anne R. Kelin.
M.Eng.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Katsouraki, Athanasia. « Sharing and Usage Control of Personal Information ». Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLV089/document.

Texte intégral
Résumé :
Nous vivons une véritable explosion du volume des données personnelles numériques qui sont générés dans le monde chaque jour (ex. capteurs, web, réseaux sociaux, etc.). En conséquence, les particuliers se sentent exposés tandis qu'ils partagent et publient leurs données. Ainsi, il est clair que des outils et des méthodes sont nécessaires pour contrôler la façon dont leurs données sont collectées, gérées et partagées. Les défis sont principalement axées sur le manque d'applications ou de solutions techniques qui assurent la gestion et le partage sécurisés de données personnelles. Le défi principal est de fournir un outil sécurisé et adaptable qui peut être utilisé par tout utilisateur, sans formation technique. Cette thèse fait trois contributions importantes dans le domaine de la protection de la vie privée : (i) Une implémentation du model UCONABC, un modèle de contrôle d'usage, appliqué à un scénario de réseau social, (ii) une extension algébrique de UCON pour contrôler des partages complexes de données (en transformant des données personnelles en données partageable et/ou publiables), et (iii) la conception, l'implémentation et le déploiement sur le terrain d'une plateforme pour la gestion de données sensibles collectées au travers de formulaires d'enquêtes
We are recently experiencing an unprecedented explosion of available personal data from sensors, web, social networks, etc. and so people feel exposed while they share and publish their data. There is a clear need for tools and methods to control how their data is collected managed and shared. The challenges are mainly focused on the lack of either applications or technical solutions that provide security on how to collect, manage and share personal data. The main challenge is to provide a secure and adaptable tool that can be used by any user, without technical background. This thesis makes three important contributions to the field of privacy: (i) a prototype implementation of the UCONABC model, a usage control model, applied to an online social networks scenario, (ii) an algebraic extension to UCON to control the complex sharing of data (by transforming personal data into sharable and publishable data) and (iii) the design, implementation and field testing of a secure platform to manage sensitive data collected through online forms
Styles APA, Harvard, Vancouver, ISO, etc.
22

Smith, Martin Philip. « The effectiveness of document ranking and relevance feedback techniques in a thesaurus-based search intermediary system ». Thesis, University of Huddersfield, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.296001.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Tsileponis, Nikolaos. « The impact of the media on the corporate financial information environment ». Thesis, University of Manchester, 2017. https://www.research.manchester.ac.uk/portal/en/theses/the-impact-of-the-media-on-the-corporate-financial-information-environment(1f073b0d-750f-4f6c-92d8-7b4c08c39321).html.

Texte intégral
Résumé :
In this thesis, I examine how the corporate financial information environment is shaped by the financial media. The thesis consists of three essays. In the first essay, I examine the role of voluntary company-initiated disclosures about firm financial performance as a stimulus for coverage in the financial press. I provide evidence that media coverage is affected by firm level disclosure management. Specifically, a firm's issuance of press releases attracts more media articles about the firm leading to greater abnormal returns and trading volumes. I find that there is a spike of media articles on the same day and one trading day following firms' press releases. I use a unique experiment, which differentiates between the online and print versions of the Wall Street Journal, to establish a causal relation between press releases and media coverage. My findings challenge the common assumption in the literature that media coverage is exogenous to the firm. In the second essay, I find that the financial media plays a significant role in enriching a firm's information environment by moderating the tone of corporate press releases. Using textual analysis, I show that the press moderates both the positive and negative tone of corporate press releases. However, the effect is asymmetric with the media disproportionately downplaying the tone of favourable corporate press releases, in line with the premise that management's highly positive news disclosures are less convincing. In addition, I find that there is an abnormal market response to the linguistic content of financial media articles rather than to the content of corporate press releases, suggesting that the tone of press-issued information is more value relevant to market participants compared to that of management's disclosures. Overall, this study offers robust evidence supporting the view that the financial media plays an important role as an information intermediary. In the third and last essay, I investigate the information dissemination and information creation roles of the financial media by examining whether the rebroadcasting of firm-initiated news (parroting) and the creation of original information by the media influence the stock market reaction to news disclosures differently. Using textual analysis, I calculate the tone expressed in corporate press releases and related articles in the financial media, and further distinguish between parroted (from the press release) and non-parroted (i.e., original) media tonal language. I provide evidence supporting a dual role of the press that affects price formation through both its information dissemination and information creation roles. However, my findings are consistent with press-generated information having the most significant impact on market reaction. My results also indicate that there is an asymmetric market effect, with negative original media tone being more value relevant to market participants compared to managerial and media-parroted (positive and negative) tonal language. As such, my findings have important implications for studies on the role of the financial media as an information intermediary in capital markets, and suggest that market participants perceive a difference between simple dissemination of firm-initiated information and new reporter-generated information.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Pagonis, John. « Evolutionary personal information filtering combating information overload caused by habitual web surfinng using an evolutionary personal content-based recommender system ». Thesis, University of Essex, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.536960.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Mark, Stephen John. « De-identification of personal information for use in software testing to ensure compliance with the Protection of Personal Information Act ». Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/63888.

Texte intégral
Résumé :
Encryption of Personally Identifiable Information stored in a Structured Query Language Database has been difficult for a long time. This is owing to block-cipher encryption algorithms changing the length and type of the input data when encrypted, which cannot subsequently be stored in the database without altering its structure. As the enactment of the South African Protection of Personal Information Act, No 4 of 2013 (POPI), was set in motion with the appointment of the Information Regulators Office in December 2016, South African companies are intensely focused on implementing compliance strategies and processes. The legislation, promulgated in 2013, encompasses the processing and storage of personally identifiable information (PII), ensuring that corporations act responsibly when collecting, storing and using individuals’ personal data. The Act comprises eight broad conditions that will become legislation once the new Information Regulator’s office is fully equipped to carry out their duties. POPI requires that individuals’ data should be kept confidential from all but those who specifically have permission to access the data. This means that not all members of IT teams should have access to the data unless it has been de-identified. This study tests an implementation of the Fixed Feistel 1 algorithm from the National Institute of Standards and Technology (NIST) “Special Publication 800-38G: Recommendation for Block Cipher Modes of Operation : Methods for Format-Preserving Encryption” using the LibFFX Python library. The Python scripting language was used for the experiments. The research shows that it is indeed possible to encrypt data in a Structured Query Language Database without changing the database schema using the new Format-Preserving encryption technique from NIST800-38G. Quality Assurance software testers can then run their full set of tests on the encrypted database. There is no reduction of encryption strength when using the FF1 encryption technique, compared to the underlying AES-128 encryption algorithm. It further shows that the utility of the data is not lost once it is encrypted.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Chan, Ching-shun Sabina. « Orientative information in personal narratives and story telling ». Click to view the E-thesis via HKUTO, 1995. http://sunzi.lib.hku.hk/hkuto/record/B36209077.

Texte intégral
Résumé :
Thesis (B.Sc)--University of Hong Kong, 1995.
"A dissertation submitted in partial fulfilment of the requirements for the Bachelor of Science (Speech and Hearing Sciences), The University of Hong Kong, April 28, 2995." Also available in print.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Atkinson, Shirley. « Risk reduction through technological control of personal information ». Thesis, University of Plymouth, 2007. http://hdl.handle.net/10026.1/2135.

Texte intégral
Résumé :
Abuse and harm to individuals, through harassment and bullying, coexist with Identity Theft as criminal behaviours supported by the ready availability of personal information. Incorporating privacy protection measures into software design requires a thorough understanding about how an individual's privacy is affected by Internet technologies. This research set out to incorporate such an understanding by examining privacy risks for two groups of individuals, for whom privacy was an important issue, domestic abuse survivors and teenagers. The purpose was to examine the reality of the privacy risks for these two groups. This research combined a number of approaches underpinned by a selection of foundation theories from four separate domains: software engineering; information systems; social science; and criminal behaviour. Semi-structured interviews, focus groups, workshops and questionnaires gathered information from managers of refuges and outreach workers from Women's Aid; representatives from probation and police domestic violence units; and teenagers. The findings from these first interactions provided specific examples of risks posed to the two groups. These findings demonstrated that there was a need for a selection of protection mechanisms that promoted awareness of the potential risk among vulnerable individuals. Emerging from these findings were a set of concepts that formed the basis of a novel taxonomy of threat framework designed to assist in risk assessment. To demonstrate the crossover between understanding the social environment and the use of technology, the taxonomy of threat was incorporated into a novel Vulnerability Assessment Framework, which in turn provided a basis for an extension to standard browser technology. A proof-of-concept prototype was implemented by creating an Internet Explorer 7.0 browser helper object. The prototype also made use of the Semantic Web protocols of Resource Description Framework and the Web Ontology Language for simple data storage and reasoning. The purpose of this combination was to demonstrate how the environment in which the individual primarily interacted with the Internet could be adapted to provide awareness of the potential risk, and to enable the individual to take steps to reduce that risk. Representatives of the user-groups were consulted for evaluation of the acceptability of the prototype approach. The favourable ratings given by the respondents demonstrated the acceptability of such an approach to monitoring personal information, with the provision that control remained with the individual. The evaluation exercise also demonstrated how the prototype would serve as a useful tool to make individuals aware of the dangers. The novel contribution of this research contains four facets: it advances understanding of privacy protection for the individual; illustrates an effective combination of methodology frameworks to address the complex issue of privacy; provides a framework for risk assessment through the taxonomy of threat; and demonstrates the novel vulnerability assessment framework through a proof-of-concept prototype.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Gyllstrom, Karl Stotts P. David. « Enriching personal information management with document interaction histories ». Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2009. http://dc.lib.unc.edu/u?/etd,2727.

Texte intégral
Résumé :
Thesis (Ph. D.)--University of North Carolina at Chapel Hill, 2009.
Title from electronic title page (viewed Mar. 10, 2010). "... in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science." Discipline: Computer Science; Department/School: Computer Science.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Sauermann, Leo. « The Gnowsis semantic desktop approach to personal information management weaving the personal semantic web ». Berlin dissertation.de, 2009. http://d-nb.info/996092501/04.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Ramnerö, David. « Semi-automatic Training Data Generation for Cell Segmentation Network Using an Intermediary Curator Net ». Thesis, Uppsala universitet, Bildanalys och människa-datorinteraktion, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-332724.

Texte intégral
Résumé :
In this work we create an image analysis pipeline to segment cells from microscopy image data. A portion of the segmented images are manually curated and this curated data is used to train a Curator network to filter the whole dataset. The curated data is used to train a separate segmentation network to improve the cell segmentation. This technique can be easily applied to different types of microscopy object segmentation.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Yiu, Kelvin Shek. « Time-based management and visualization of personal electronic information ». Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0016/MQ29420.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

Ghaly, Marcus. « Thoughtmarks : Re-thinking Bookmarks & ; the Personal Information Space ». Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22962.

Texte intégral
Résumé :
Bookmarking is one of the main methods by which users store the online information they find valuable. However, bookmarks in their current incarnation suffer from a number of drawbacks which do not support users in their daily routines. Bookmarks are very easy to make, but over time this causes bookmark collections to grow, requiring systems of organization to keep track of everything. Eventually though these systems of organization require organizing themselves. And as time passes the titles of both bookmarks and folders begin to loose their meaning and users find it harder and harder to determine a bookmark’s value or a folder’s contents based on title alone. This leads to the bookmarks themselves becoming stale and unused, making collections that much harder to search through when trying to re-find one’s found, online information.This thesis proposes to re-imagine bookmarks as visualized information that is easily recognizable, and can help users to predict the information a bookmark links to. In this way it is hoped that bookmarks can become a more meaningful link between users and their found, online information. Furthermore, automated tagging is proposed to assist users when searching for their content, as well as chronological sorting to help users visually scan through their collections and re-find their bookmarks. Finally, non- hierarchical, folder-less bookmarking was also proposed, though in the end this did not map to users’ habits. That being said, visualizing bookmarks would appear to be worth pursuing as it resonated with users, and could be one direction to follow in assisting users with their information collections.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Brock, Kathy Thomas. « Developing information literacy through the information intermediary process a model for school library media specialists / ». 1993. http://books.google.com/books?id=tLPgAAAAMAAJ.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Kipp, Margaret E. I. « Exploring the Context of User, Creator and Intermediary Tagging ». 2006. http://hdl.handle.net/10150/105151.

Texte intégral
Résumé :
7th Information Architecture Summit, Vancouver, BC, March 23-27
This paper examines the results of a study of the three groups involved in creating index keywords or tags: users, authors and intermediaries. Keywords from each of the three groups were compared to determine similarities and differences in term use. Comparisons suggested that there were important differences in the contexts of the three groups that should be taken into account when assigning keywords or designing systems for the organisation of information.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Bauer, Mareike Fenja. « Personal Information Management mit Personal Information Management Tools am Beispiel von Evernote ». Thesis, 2015. http://eprints.rclis.org/29882/1/Bachelorarbeit_Mareike_Fenja_Bauer.pdf.

Texte intégral
Résumé :
Objective : Goal of this study was to identify preference of tagging and the use of folders during Personal Information Management using the example of the PIM-Tool Evernote. This study also identifies motivations and demotivations which are leading to the choice of Tagging or Folders. Methods : This study was conducted using a combination of the scientifc methods content analysis, discourse analysis and social media monitoring. Import.io was used to extract the data from Evernotes user forums and MAXQDA to apply coding. Results : There was no significant leaning, neither towards tagging nor towards the use of folders. Instead there was a tendency to use both of these strategies in combination. There were lots of different motivations and demotivation, some of them are typicial for the particular strategie and some of them are influenced by the PIM-Tool. Conclusion : The results of the study indicate that the choice of the PIM-strategy is, apart from other factors, strongly affected by the PIM-Tool, in this case Evernote.
Styles APA, Harvard, Vancouver, ISO, etc.
36

CHEN, BAI-HUAN, et 陳柏寰. « Impact of Personal Self-efficacy on the Intermediary between Challenge Pressure Source and Job Involvement ». Thesis, 2018. http://ndltd.ncl.edu.tw/handle/ck7t86.

Texte intégral
Résumé :
碩士
康寧大學
企業管理研究所
106
Based on the theory of expectation, this study explores the relationship between challenging stressors, self-efficacy, and job commitment. Through theoretical derivation, this study believes that self-efficacy plays an intermediary role between the challenge-type stress source and the work input. This study conducted a questionnaire survey of public and private medical institutions and care institutions in the northern region. A total of 400 questionnaires were sent and 196 valid questionnaires were collected. The results of the study found that individuals' perceptually-challenged stressors not only positively affect job input, but also have a positive effect on self-efficacy. And personal self-efficacy will positively affect personal job input. After further analysis of this study, we found that individuals' perceptual-challenged stressors will influence the work input through the intermediary mechanism of individual self-efficacy. That is, individual self-efficacy will affect the impact of individual stress on the individual's work commitment. The paper also discusses the practical implications of the findings.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Cheng, Chi-Wen, et 鄭祺文. « Design of Personal Information Agent ». Thesis, 2000. http://ndltd.ncl.edu.tw/handle/93192832868394945104.

Texte intégral
Résumé :
碩士
國立交通大學
資訊工程系
88
As the Internet grows rapidly, we can get many information in the Internet. So, it’s more important to find the information that we want. Search engines may help us to find the relative information, it’s still user’s responsibility to actively use it. In this thesis, we design a tool, called Personal Information Agent (PIA), that can actively push information to users. In this thesis, we design a Personal Information Agent framework, it help us to develop the Personal Information Agent application by calling these objects or functions. We also implement a personal information application based on the framework to demonstrate the correctness and feasibility of our system architecture.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Tung, Tse-Hua, et 童子樺. « Personal Health Information Management System ». Thesis, 2007. http://ndltd.ncl.edu.tw/handle/32834402189836574756.

Texte intégral
Résumé :
碩士
國立陽明大學
醫學工程研究所
95
We hope to provide a long-term record interface through developing a personal health information management system which includes a physiological database for four chronic diseases(e.g. Heart disease, Hypertension, Metabolism and Asthma) and there relative major physiological parameters(e.g. ECG, Blood Pressure, Blood Glucose, Peak Flow and SPO2.). With Long-term personal records compared with physiology parameters criteria, and assisted with the importance log and the 2nd order curve fitting trends. The characteristic of local database provide the ability to carry personal health record anywhere and help users to provide doctors more aid in diagnostic information which were recorded during non-visiting duration.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Liu, Kai, et 劉凱. « Personal Game Information Management System ». Thesis, 2006. http://ndltd.ncl.edu.tw/handle/40418613669248659213.

Texte intégral
Résumé :
碩士
義守大學
資訊工程學系碩士班
94
Modern IT technique and broadband network infrastructure make on-line games become one of the high value-added industries. Especially when the market of the broadband network grew rapidly since 2000, not only the market of the on-line games increased in 10 megabyte speed, it also becomes the most favorite entertainment to all ages. Extra information will be adopted during the game playing that makes the users confused to filter and organize the information from the overwhelming Internet information. In order to solve this problem, a system is proposed to let user get the valued knowledge and organize from the Internet via the information fetch. This thesis designs an information objects searching mechanism based on the method of RSS (Really Simple Syndication) to build the personal game knowledge-searching infrastructure as the basis of the game knowledge-searching system design. Valuable game knowledge could be obtained by this personal game knowledge-searching system. Since this system is not restricted by the source or the property of the information, it could be applied in the other system.
Styles APA, Harvard, Vancouver, ISO, etc.
40

沈正祥. « A Study on the Self-determination Right to Personal Information in Personal Information Protection Act ». Thesis, 2013. http://ndltd.ncl.edu.tw/handle/ntbdf3.

Texte intégral
Résumé :
碩士
逢甲大學
財經法律研究所
102
In today’s society, privacy infringement can be summarized in three aspects: the internet, electronic products and news media. Technological advancement enables people to chat, contact and even make transaction with people at any corner of the world, without the need to step out of their homes. Even though the person to talk with is far away from them, people can make connection in only several seconds’ time. Nevertheless, while people are glad to share their lives and moods with other people on the internet, they begin to worry that their personal information has been invisibly used by other people. They are also angry with the advertising behavior that uses portraiture right without their consent. Therefore, people also begin to suggest that they should possess the right to make decisions on the collection, handling and use of their personal information. Individuals should be the source of information, and are the final deciders as well. Any collection, handling and use of individuals’ information without their decision making should be prohibited. Just because of this, the paper mainly explores the development of the concept of autonomy of decision-making for personal information, and examines the clauses and stipulations of Taiwan’s newly amended Personal Information Protection Act. After that, the paper uses the theories derived from them as the foundation to review what kind of decision-making and control rights individuals should possess over the collection, handling and use of the related personal information. Possessing these rights, individuals can really control the flow of their personal information. Besides, the fear of inappropriate use of their information can be reduced. Furthermore, the flow of information amongst people can be enhanced. As a result, information can really be properly used and personal privacy can be protected.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Hsu, Ming-yuan, et 徐敏原. « Design and Implementation of a Personal Digital Assistant─Document, Personal Information and Contact Information Management ». Thesis, 2012. http://ndltd.ncl.edu.tw/handle/36483169615310001130.

Texte intégral
Résumé :
碩士
國立臺灣科技大學
電機工程系
100
In these years, the smart mobile devices have developed rapidly and spread widely, have became a part of many people’s life. The smart mobile devices can expand the functionality by downloading the applications, such as document management system, password management system and schedule management system, etc. Although there are many kinds of applications, but the application which integrated multiple functions is a handful. This thesis integrated three different types of subsystem, document management subsystem, password management subsystem and contact management subsystem, to develop an iPad personal digital assistant based on iOS. “Document management subsystem” uses the concept of multiuser, combined with cloud services and project and schedule management subsystem. Projects and meetings can attach files from document management subsystem, and users can browse projects or meetings information through the reference files. “Password management subsystem” protects the user password information content by using virtual information and AES encryption. “Contact management subsystem” provides the user to manage personal contact information, users can watch the contact related projects, meetings and photos. This thesis implements a multi-function personal digital assistant through information sharing between each system.
Styles APA, Harvard, Vancouver, ISO, etc.
42

LIN, HSUEH-YUEH, et 林學鉞. « Explore the Relationship between Information Disclosure, Information Intermediary and Stock Price for the Public Employees Pension Fund Investment ». Thesis, 2017. http://ndltd.ncl.edu.tw/handle/mumd77.

Texte intégral
Résumé :
碩士
國防大學
財務管理學系
105
Promoting the degree of corporate disclosure information to reduce the investment risk in the stock market has always been an important indicator that government promotes reforms of corporate governance, and financial analysts’ financial reports are not only limited by the degree of transparency, but also significant correlation of the stock price. In this study, we use the Ohlson model as the structure with the information disclosure and the information intermediary, and we want to explore the relationship with stock price. The results show that the ratio of independent directors is positive relationship with stock price, and analysts’ forecast for the stock price also has a significant positive impact. This article explores the situation of the stock market with information disclosure and information intermediary, and that hopes to provide investors with making financial decision.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Chen, Kuei-Fen, et 陳桂芬. « Factors Affecting Personal Health Information Disclosure ». Thesis, 2015. http://ndltd.ncl.edu.tw/handle/25384978199805407706.

Texte intégral
Résumé :
碩士
國立交通大學
資訊管理研究所
103
The implementation of electronic medical record (EMR) exchange is an important tread. However, EMR exchange suffers from some problems. For example, concern for health information privacy may cause individuals unwilling to provide personal health information. To better understand individuals’ intention, we tried to examine the correlation between individuals’ concern for information privacy and their intention. Beside this, based on a social exchange theory perspective, the antecedents in organizational dimension of CFIP were examined. In this study, our proposed model was empirically validated by 138 respondents in Taiwan. Four hypotheses were assessed by Structural Equation Modeling (SEM) via statistical analysis software SmartPLS 3.0. Three hypotheses were significant supported which indicate that all of the components of social exchange theory were critical, and the proposed model is applicable in EMR exchange context.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Kim, Jinyoung. « Retrieval and Evaluation Techniquesfor Personal Information ». 2012. https://scholarworks.umass.edu/open_access_dissertations/649.

Texte intégral
Résumé :
Providing an effective mechanism for personal information retrieval is important for many applications, and requires different techniques than have been developed for general web search. This thesis focuses on developing retrieval models and representations for personal search, and on designing evaluation frameworks that can be used to demonstrate retrieval effectiveness in a personal environment. From the retrieval model perspective, personal information can be viewed as a collection of multiple document types each of which has unique metadata. Based on this perspective, we propose a retrieval model that exploits document metadata and multi-type structure. Proposed retrieval models were found to be effective in other structured document collections, such as movies and job descriptions. Associative browsing is another search method that can complement keyword search. To support this type of search, we propose a method for building an association graph representation by combining multiple similarity measures based on a user's click patterns. We also present a learning techniques for refining the graph structure based on user's clicks. Evaluating these methods is particularly challenging for personal information due to privacy issues. This thesis introduces a set of techniques that enables realistic and repeatable evaluation of techniques for personal information retrieval. In particular, we describe techniques for simulating test collections and show that game-based user studies can collect more realistic usage data with relatively small cost.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Bibi, Khalil. « Personal information prediction from written texts ». Thesis, 2020. http://hdl.handle.net/1866/24308.

Texte intégral
Résumé :
La détection de la paternité textuelle est un domaine de recherche qui existe depuis les années 1960. Il consiste à prédire l’auteur d’un texte en se basant sur d’autres textes dont les auteurs sont connus. Pour faire cela, plusieurs traits sur le style d’écriture et le contenu sont extraits. Pour ce mémoire, deux sous-problèmes de détection de la paternité textuelle ont été traités : la prédiction du genre et de l’âge de l’auteur. Des données collectées de blogs en ligne ont été utilisées pour faire cela. Dans ce travail, plusieurs traits (features) textuels ont été comparé en utilisant des méthodes d’apprentissage automatique. De même, des méthodes d’apprentissage profond ont été appliqués. Pour la tâche de classification du genre, les meilleurs résultats ont été obtenus en appliquant un système de vote majoritaire sur la prédiction d’autres modèles. Pour la classification d’âge, les meilleurs résultats ont été obtenu en utilisant un classificateur entrainé sur TF-IDF.
Authorship Attribution (AA) is a field of research that exists since the 60s. It consists of identifying the author of a certain text based on texts with known authors. This is done by extracting features about the writing style and the content of the text. In this master thesis, two sub problems of AA were treated: gender and age classification using a corpus collected from online blogs. In this work, several features were compared using several feature-based algorithms. As well as deep learning methods. For the gender classification task, the best results are the ones obtained by a majority vote system over the outputs of several classifiers. For the age classification task, the best result was obtained using classifier trained over TFIDF.
Styles APA, Harvard, Vancouver, ISO, etc.
46

TANG, WEN-TING, et 唐文婷. « Personal Health Blockchain of Integrated Information ». Thesis, 2019. http://ndltd.ncl.edu.tw/handle/kbg65c.

Texte intégral
Résumé :
碩士
世新大學
資訊管理學研究所(含碩專班)
107
Currently, personal health information is stored through third-party organizations. In order for people to access their own information, they must go through tedious procedures and spend a significant amount of time and money only to sometimes access data that is incomplete. Through blockchain technology, we can collate all of this health information into one, including, the amount of exercise, disease and diet management. The information will be protected through encryption, non-tampering and decentralization. Users can control these integrated health information without worrying about data being tampered with and/or modified. This creates ease for people to readily be able to access their own heath and medical information and using QR Code to allow different medical practices to access this information with your permission. New data will be transferred into the blockchain through the system or manually. This significantly streamlines the process of accessing medical information between clinics and hospitals regarding treatment, medical history and other data, as you would readily have this information regardless of which medical facility you are accessing.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Marková, Katerina. « Digital dying in personal information management towards thanotosensitive information management ». Master's thesis, 2011. http://hdl.handle.net/10216/65334.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
48

Marková, Katerina. « Digital dying in personal information management towards thanotosensitive information management ». Dissertação, 2011. http://hdl.handle.net/10216/65334.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
49

Parbanath, Steven. « Personal information security : legislation, awareness and attitude ». Thesis, 2011. http://hdl.handle.net/10413/9651.

Texte intégral
Résumé :
Ecommerce refers to the buying and selling of products and services electronically via the Internet and other computer networks (Electronic Commerce 2011). The critical components of ecommerce are a well designed website and a merchant account for payment by the customer (Ecommerce critical components 2008). Merchants that sell their products and services via the Internet have a competitive edge over those that do not. It is therefore becoming common practice for both small and large business to transact electronically. With the vast opportunities, new risks and vulnerabilities are introduced. Consumers are reluctant to transact electronically because of the fear of unauthorized access and interception of confidential information (Online Banking Concerns 2011). Other fears include the changing of data with malicious intent, denial of use, hacking, deliberate disclosure of confidential information and e-mail associated risks (Safeena, Abdulla & Date 2010). The use of technology such as encryption and decryption has not adequately addressed these problems because fraudsters have found new and sophisticated methods of attaining consumer information illegally. Phishing is one such method. Phishing results in identity theft and financial fraud when the fraudster tricks the online users into giving their confidential information like passwords, identity numbers, credit card number and personal information such as birthdates and maiden names. The fraudster will then use the information to impersonate the victim to transfer funds from the victim‟s account or use the victim‟s information to make purchases (Srivastava 2007). Since 2002, many laws passed in South Africa have attempted to allay fears so that consumers can conduct business electronically with confidence. The following legislation aims to protect consumers: - The Electronic Communications and Transactions Act (Republic of South Africa 2002). - The Consumer Protection Act (Republic of South Africa 2008). - The Protection of Personal Information Bill which is expected to be passed in 2011 (Republic of South Africa 2009). This research aims to examine the extent to which these legislation can address the security concerns of consumers. The researcher is also interested in ascertaining how knowledgeable consumers are on these legislation and what their attitudes are towards their personal information security.
Thesis (M.Com.)-University of KwaZulu-Natal, Westville, 2011.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Kao, Chia-Hung, et 高嘉宏. « An Intelligent Architecture for Personal Information Management ». Thesis, 2002. http://ndltd.ncl.edu.tw/handle/05154903606991656578.

Texte intégral
Résumé :
碩士
國立中山大學
電機工程學系研究所
90
Abstract As the Internet and wireless technologies become mature, people may use more than one digital device to manage their personal data. However, the complexities and difficulties in personal information management will arise due to various devices and heterogeneous platforms. To cope with this problem, we design an intelligent architecture for personal information management based on the XML-RPC technology, which allows the software running on disparate operating systems and in different environments to make procedure calls over the Internet. We also implement an information server to manage the whole data and handle the synchronization process. The system provides users a simple and convenient environment to manage and synchronize their personal information. Besides, the group facility in this system makes the people in the same group or community capable of sharing their information more easily.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie