Добірка наукової літератури з теми "Intermediary of of personal information"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Intermediary of of personal information".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Intermediary of of personal information"
Asunka, Anna. "Internet Service Providers and Intermediary Liabilities." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 23, 2022): 113–18. http://dx.doi.org/10.22624/aims/crp-bk3-p19.
Повний текст джерелаMarotta, Veronica, Yue Wu, Kaifu Zhang, and Alessandro Acquisti. "The Welfare Impact of Targeted Advertising Technologies." Information Systems Research 33, no. 1 (March 2022): 131–51. http://dx.doi.org/10.1287/isre.2021.1024.
Повний текст джерелаTaylor, Robert S. "Question-Negotiation and Information Seeking in Libraries." College & Research Libraries 76, no. 3 (March 1, 2015): 251–67. http://dx.doi.org/10.5860/crl.76.3.251.
Повний текст джерелаWang, Shu, Tsongming Lin, and Yingkai Liao. "The Intermediary Effect of Attachment Behavior in Live Streaming Marketing." Modern Economics & Management Forum 3, no. 4 (September 14, 2022): 262. http://dx.doi.org/10.32629/memf.v3i4.1023.
Повний текст джерелаKusumawardani, Saskia, Sinta Dewi Rosadi, and Elisatris Gultom. "GOOD CORPORATE GOVERNANCE PRINCIPLES ON INTERNET INTERMEDIARY COMPANIES IN PROTECTING THE PRIVACY OF PERSONAL DATA IN INDONESIA." Yustisia Jurnal Hukum 9, no. 1 (May 6, 2020): 65. http://dx.doi.org/10.20961/yustisia.v9i1.39683.
Повний текст джерелаKoehler, Karl A. "Inducing phase transitions in local innovation networks: Implications for state economic development." Local Economy: The Journal of the Local Economy Policy Unit 32, no. 8 (November 7, 2017): 854–66. http://dx.doi.org/10.1177/0269094217739370.
Повний текст джерелаKARAKURT, Yağmur. "The Moderation Role of Need of Social Acceptance on the Relationships between Gender Roles and Sexual Quality." International Journal of Psychology and Educational Studies 9, no. 2 (March 26, 2022): 479–91. http://dx.doi.org/10.52380/ijpes.2022.9.2.740.
Повний текст джерелаHegarty, Rosaleen, Tom Lunney, Kevin Curran, and Maurice Mulvenna. "Ambient Interface Design (AID) for the Ergonomically Challenged." International Journal of Ambient Computing and Intelligence 2, no. 2 (April 2010): 57–64. http://dx.doi.org/10.4018/jaci.2010040104.
Повний текст джерелаGiglio, Ferdinando. "Crowdfunding: An Alternative Method to Invest." International Business Research 15, no. 3 (January 31, 2022): 13. http://dx.doi.org/10.5539/ibr.v15n3p13.
Повний текст джерелаHendricks-Sturrup, Rachele M., and Christine Y. Lu. "What motivates the sharing of consumer-generated genomic information?" SAGE Open Medicine 8 (January 2020): 205031212091540. http://dx.doi.org/10.1177/2050312120915400.
Повний текст джерелаДисертації з теми "Intermediary of of personal information"
Katule, Ntwa. "Utilization of personal health informatics through intermediary users." Doctoral thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29358.
Повний текст джерелаLUCHETTA, GIACOMO. "Antitrust and regulation in the European Union: selected topics." Doctoral thesis, Luiss Guido Carli, 2013. http://hdl.handle.net/11385/200830.
Повний текст джерелаGartner, R. "Intermediary XML schemas." Thesis, City, University of London, 2018. http://openaccess.city.ac.uk/20288/.
Повний текст джерелаKo, Leonard L. "Personal information system /." Online version of thesis, 1993. http://hdl.handle.net/1850/11976.
Повний текст джерелаSingh, Gurvinder. "Detection of intermediary hosts through TCP latency propagation." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9029.
Повний текст джерелаToday people from all lifestyles, government officials, researchers and executives use internet. The people start to depend on internet for their daily life. However, the increased dependence comes with a great risk. The popularity and potential of internet attracts users with illegal intentions as well. The attackers generally establish a connection chain by logging in to a number of intermediary hosts before launching an attack at the victim host. These intermediary hosts are called as stepping-stones. On the victim side, it becomes hard to detect that the peer communicating with the victim is whether a real originator of the connection or it is merely acting as an intermediary host in the connection chain. This master dissertation proposed an approach based on Interarrival packet time to distinguish an incoming connection from a connection coming via some intermediary hosts. The proposed approach uses information available at the receiving end and applicable to encrypted traffic too. The approach was successfully tested for SSH, Telnet, FTP, HTTP and SMTP protocols and implemented in to an intrusion detection system for corresponding protocols. The main applications for the proposed approach are Manual intrusion detection, Tor usage detection and Spam messages detection. The approach is also applicable for the digital forensics investigations. Keywords : Network security, Stepping stone detection, Manual intrusion detection, Tor usage detection, Spam detection and Digital forensics investigation.
Honda, Jun. "Intermediary Search for Suppliers in Procurement Auctions." WU Vienna University of Economics and Business, 2015. http://epub.wu.ac.at/4628/1/wp203.pdf.
Повний текст джерелаSeries: Department of Economics Working Paper Series
Layouni, Mohamed. "Privacy-preserving personal information management." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.
Повний текст джерелаIn this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
McNeill, Allan. "Semantic structure of personal information." Thesis, Connect to e-thesis, 2002. http://theses.gla.ac.uk/840/.
Повний текст джерелаPh.D. thesis submitted to the Department of Psychology, University of Glasgow, 2002. Includes bibliographical references. Print version also available.
Nelwamondo, Murendeni. "The role of intermediaries in information sharing between government and communities in Western Cape." University of the Western Cape, 2021. http://hdl.handle.net/11394/8293.
Повний текст джерелаThe use of Information and Communication Technology (ICT) to share information is rapidly increasing worldwide. The South African government uses ICT to extend sharing of information and provide services to communities through websites, portals, forums and other online platforms. However, there are still digitally divided communities – without access it these ICTs due to, among others, a lack of necessary computer skills and financial resources. Consequently, these communities miss opportunities to use ICTs to share information with the government. To address the digitally divided communities, the government established an initiative to build community ICT access centres (e-centres). These e-centres have become the intermediaries between government and communities as shared community facilities that provide access to ICTs and connect the digitally divided communities to government services with social and economic benefits. However, there seem to be disparities between the government's roles and the eventual roles played by intermediaries in information sharing between communities and the government. The disparity might lead to intermediaries not providing services expected by communities, which might affect how communities use intermediaries to communicate with the government.
Franz, Thomas [Verfasser]. "Semantic Personal Information Management / Thomas Franz." München : Verlag Dr. Hut, 2010. http://d-nb.info/1009972243/34.
Повний текст джерелаКниги з теми "Intermediary of of personal information"
Ingwersen, Peter. Information retrieval interaction: Design variables and intermediary functionality. Copenhagen: Royal School of Librarianship, 1992.
Знайти повний текст джерелаWaldfogel, Joel. Does information undermine brand?: Information intermediary use and preference for branded web retailers. Cambridge, MA: National Bureau of Economic Research, 2003.
Знайти повний текст джерелаAnderson, Ross, ed. Personal Medical Information. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/978-3-642-59023-8.
Повний текст джерелаEtzel, Barbara, and Peter Thomas. Personal Information Management. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8.
Повний текст джерелаAllen, Bryce. Bibliographic and text-linguistic schemata in the user-intermediary interaction. Ottawa: National Library of Canada, 1989.
Знайти повний текст джерелаOregon. Division of Finance and Corporate Securities., ed. Protecting your personal information. [Salem, Or.]: Dept. of Consumer & Business Services, Division of Finance and Corporte Securities, 2007.
Знайти повний текст джерелаAccess to personal information. Sydney, N.S.W: New South Wales Law Reform Commission, 2010.
Знайти повний текст джерелаCouncil, Learning and Skills. The Role of intermediary agencies in promoting information advice and guidance in the workplace. Coventry: LSC, 2003.
Знайти повний текст джерелаD, Naumann Justus, ed. Personal productivity with information technology. New York, N.Y: McGraw-Hill Companies, Inc., 1997.
Знайти повний текст джерелаWebb, Sylvia P. Personal development in information work. 2nd ed. London: Aslib, 1991.
Знайти повний текст джерелаЧастини книг з теми "Intermediary of of personal information"
Yu, Wenli, Li Li, Jingyuan Wang, Dengbao Wang, Yong Wang, Zhanbo Yang, and Min Huang. "Learning Intermediary Category Labels for Personal Recommendation." In Web and Big Data, 124–32. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63564-4_10.
Повний текст джерелаKing, Chris. "Personal Information." In Advanced BlackBerry 6 Development, 189–232. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3211-7_6.
Повний текст джерелаByon, Andrew Sangpil. "Personal information." In Modern Korean Grammar Workbook, 255–57. New York : Routledge-Taylor & Francis Group, [2017] | Series: Routledge Modern Grammars: Routledge, 2017. http://dx.doi.org/10.4324/9781315178158-63.
Повний текст джерелаKing, Chris. "Personal Information." In Advanced BlackBerry Development, 195–239. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-2657-4_6.
Повний текст джерелаWallwork, Adrian. "Personal Information." In English for Academic Research, 33–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11090-1_3.
Повний текст джерелаvan der Burg, Martijn. "Intermediary Bodies of Governance." In Napoleonic Governance in the Netherlands and Northwest Germany, 67–91. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66658-3_4.
Повний текст джерелаEtzel, Barbara, and Peter Thomas. "Personal information management." In Personal Information Management, 8–17. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_2.
Повний текст джерелаLee, Newton. "Personal Information Management." In Facebook Nation, 159–68. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5308-6_12.
Повний текст джерелаEtzel, Barbara, and Peter Thomas. "‘Information overload’ and information management ‘re-engineering’." In Personal Information Management, 25–31. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_4.
Повний текст джерелаKauffman, Robert J., T. S. Raghu, and Matt Sopha. "Producer-Intermediary Relationships in the Long Tail." In Lecture Notes in Business Information Processing, 105–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17449-0_10.
Повний текст джерелаТези доповідей конференцій з теми "Intermediary of of personal information"
Meissner, Fritz, and Edwin Blake. "Understanding culturally distant end-users through intermediary-derived personas." In the South African Institute of Computer Scientists and Information Technologists Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2072221.2072266.
Повний текст джерелаMaungwa, Tumelo, and Ina Fourie. "How experiences reported on intermediary information seeking from inter-disciplinary contexts can inform a study on competitive intelligence professionals." In ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2023.
Повний текст джерелаGallup, Lloyd, Jay McCormack, Steven Beyerlein, and Edwin Odom. "Rationale and Methodology for Deploying Axiomatic Design in Interdisciplinary Capstone Design Courses." In ASME 2008 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/detc2008-49885.
Повний текст джерелаYamakami, Toshihiko. "Open intermediary analysis in mobile data services: Shift from closed to open intermediary services." In 2010 3rd International Conference on Information Sciences and Interaction Sciences (ICIS). IEEE, 2010. http://dx.doi.org/10.1109/icicis.2010.5534769.
Повний текст джерелаPeter, Cruickshank, Gemma Webster, and Frances Ryan. "Assisting information practice: from information intermediary to digital proxy." In ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2017.
Повний текст джерелаTakizawa, Yui, Kazutaka Tsuji, and Tatsuhiro Yonekura. "How to Encourage Intermediary on Social Media." In 2012 15th International Conference on Network-Based Information Systems (NBiS). IEEE, 2012. http://dx.doi.org/10.1109/nbis.2012.102.
Повний текст джерелаSong, Xiaoyu, Lianzhong Liu, Chunfang Li, and Zhouyang Li. "A CRM-oriented model for evaluating intermediary." In 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference (ITAIC). IEEE, 2014. http://dx.doi.org/10.1109/itaic.2014.7065100.
Повний текст джерелаHu, Jianping. "Training Needs Analysis of Talent Intermediary Organization Based on Goldstein Model - A Case Study of a Talent Intermediary Organization." In 2011 International Conference on Information Technology, Computer Engineering and Management Sciences (ICM). IEEE, 2011. http://dx.doi.org/10.1109/icm.2011.42.
Повний текст джерелаAlijani, Reza, Siddhartha Banerjee, Kamesh Munagala, and Kangning Wang. "The Limits of an Information Intermediary in Auction Design." In EC '22: The 23rd ACM Conference on Economics and Computation. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3490486.3538370.
Повний текст джерелаXiaoping, Wu. "PROBLEMS, TASKS AND COUNTERMEASURES FOR TEACHING SECONDARY WRITING BASED ON CHINESE PROFICIENCY GRADING STANDARDS — FROM THE PERSPECTIVE OF MEMETI." In Chinese Studies in the 21st Century. Buryat State University Publishing Department, 2022. http://dx.doi.org/10.18101/978-5-9793-1802-8-2022-52-59.
Повний текст джерелаЗвіти організацій з теми "Intermediary of of personal information"
Waldfogel, Joel, and Lu Chen. Does Information Undermine Brand? Information Intermediary Use and Preference for Branded Web Retailers. Cambridge, MA: National Bureau of Economic Research, September 2003. http://dx.doi.org/10.3386/w9942.
Повний текст джерелаGarfinkel, Simson L. De-identification of personal information. National Institute of Standards and Technology, October 2015. http://dx.doi.org/10.6028/nist.ir.8053.
Повний текст джерелаNystrom, M., S. Parkinson, A. Rusch, and M. Scott. PKCS #12: Personal Information Exchange Syntax v1.1. Edited by K. Moriarty. RFC Editor, July 2014. http://dx.doi.org/10.17487/rfc7292.
Повний текст джерелаHelton-Fauth, Whitney B. Privacy Concerns Related to the Collection of Personal Information Under the Personal Identify Verification (PIV) Program. Fort Belvoir, VA: Defense Technical Information Center, March 2008. http://dx.doi.org/10.21236/ada477739.
Повний текст джерелаForsdick, Harry C., and Robert H. Thomas. Research in Distributed Personal Computer-Based Information Systems. Volume 1. Fort Belvoir, VA: Defense Technical Information Center, August 1988. http://dx.doi.org/10.21236/ada203780.
Повний текст джерелаForsdick, Harry C., and Robert H. Thomas. Research in Distributed Personal Computer-Based Information Systems. Volume 2. Fort Belvoir, VA: Defense Technical Information Center, August 1988. http://dx.doi.org/10.21236/ada203845.
Повний текст джерелаBukhari, Hanan, Kelly Weathers, and Barbara Frazier. Information-seeking and Personal Capital in Novice Learners' Creative Design Approach. Ames: Iowa State University, Digital Repository, November 2016. http://dx.doi.org/10.31274/itaa_proceedings-180814-1450.
Повний текст джерелаBridges, W. M., and Harld L. Frohman. An Electronic Data Interchange Prototype for Exchanging Personal Property Shipment Information. Fort Belvoir, VA: Defense Technical Information Center, March 1992. http://dx.doi.org/10.21236/ada260908.
Повний текст джерелаHasty, III, and Thomas J. Protection of Personal Privacy Interests under the Freedom of Information Act. Fort Belvoir, VA: Defense Technical Information Center, June 1991. http://dx.doi.org/10.21236/ada242183.
Повний текст джерелаMcGregor-Lowndes, Myles, Marie Balczun, and Alexandra Williamson. Ancillary Funds 2000–2019: ACPNS Current Issues Information Sheet 2021-1. Queensland University of Technology, July 2021. http://dx.doi.org/10.5204/rep.eprints.211850.
Повний текст джерела