Дисертації з теми "Intermediary of of personal information"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Intermediary of of personal information".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Katule, Ntwa. "Utilization of personal health informatics through intermediary users." Doctoral thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29358.
Повний текст джерелаLUCHETTA, GIACOMO. "Antitrust and regulation in the European Union: selected topics." Doctoral thesis, Luiss Guido Carli, 2013. http://hdl.handle.net/11385/200830.
Повний текст джерелаGartner, R. "Intermediary XML schemas." Thesis, City, University of London, 2018. http://openaccess.city.ac.uk/20288/.
Повний текст джерелаKo, Leonard L. "Personal information system /." Online version of thesis, 1993. http://hdl.handle.net/1850/11976.
Повний текст джерелаSingh, Gurvinder. "Detection of intermediary hosts through TCP latency propagation." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9029.
Повний текст джерелаToday people from all lifestyles, government officials, researchers and executives use internet. The people start to depend on internet for their daily life. However, the increased dependence comes with a great risk. The popularity and potential of internet attracts users with illegal intentions as well. The attackers generally establish a connection chain by logging in to a number of intermediary hosts before launching an attack at the victim host. These intermediary hosts are called as stepping-stones. On the victim side, it becomes hard to detect that the peer communicating with the victim is whether a real originator of the connection or it is merely acting as an intermediary host in the connection chain. This master dissertation proposed an approach based on Interarrival packet time to distinguish an incoming connection from a connection coming via some intermediary hosts. The proposed approach uses information available at the receiving end and applicable to encrypted traffic too. The approach was successfully tested for SSH, Telnet, FTP, HTTP and SMTP protocols and implemented in to an intrusion detection system for corresponding protocols. The main applications for the proposed approach are Manual intrusion detection, Tor usage detection and Spam messages detection. The approach is also applicable for the digital forensics investigations. Keywords : Network security, Stepping stone detection, Manual intrusion detection, Tor usage detection, Spam detection and Digital forensics investigation.
Honda, Jun. "Intermediary Search for Suppliers in Procurement Auctions." WU Vienna University of Economics and Business, 2015. http://epub.wu.ac.at/4628/1/wp203.pdf.
Повний текст джерелаSeries: Department of Economics Working Paper Series
Layouni, Mohamed. "Privacy-preserving personal information management." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.
Повний текст джерелаIn this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
McNeill, Allan. "Semantic structure of personal information." Thesis, Connect to e-thesis, 2002. http://theses.gla.ac.uk/840/.
Повний текст джерелаPh.D. thesis submitted to the Department of Psychology, University of Glasgow, 2002. Includes bibliographical references. Print version also available.
Nelwamondo, Murendeni. "The role of intermediaries in information sharing between government and communities in Western Cape." University of the Western Cape, 2021. http://hdl.handle.net/11394/8293.
Повний текст джерелаThe use of Information and Communication Technology (ICT) to share information is rapidly increasing worldwide. The South African government uses ICT to extend sharing of information and provide services to communities through websites, portals, forums and other online platforms. However, there are still digitally divided communities – without access it these ICTs due to, among others, a lack of necessary computer skills and financial resources. Consequently, these communities miss opportunities to use ICTs to share information with the government. To address the digitally divided communities, the government established an initiative to build community ICT access centres (e-centres). These e-centres have become the intermediaries between government and communities as shared community facilities that provide access to ICTs and connect the digitally divided communities to government services with social and economic benefits. However, there seem to be disparities between the government's roles and the eventual roles played by intermediaries in information sharing between communities and the government. The disparity might lead to intermediaries not providing services expected by communities, which might affect how communities use intermediaries to communicate with the government.
Franz, Thomas [Verfasser]. "Semantic Personal Information Management / Thomas Franz." München : Verlag Dr. Hut, 2010. http://d-nb.info/1009972243/34.
Повний текст джерелаAkbas, Mehmet. "Personal information search on mobile devices." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FAkbas.pdf.
Повний текст джерелаThesis Advisor(s): Singh, Gurminder ; Otani, Thomas. "September 2007." Description based on title screen as viewed on October 22, 2007. Includes bibliographical references (p. 83-87). Also available in print.
Liu, Jamie M. Eng Massachusetts Institute of Technology. "Customizable application for personal information management." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61172.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references (p. 83-84).
As digital content becomes increasingly pervasive in our daily lives, next-generation organizational tools must be developed to help end users curate that information. The information management tools available today are limited in several ways. They are either restrictive in how users define and organize their data, or they offer few options in how users can view and interact with that data. In this thesis, we introduce a new application geared toward the layman end user to help resolve this lack of personalization when managing data. With this tool, users can store any collection of information (i.e. to do lists, address book, DVD collection), customize how they want to view and browse that data, and create any number of visualizations for the same data set or overlapping sets of data. For example, a user might want to manage an address book for a collection of all contacts, and manage a different set of items involving all research-related items, including colleagues, in another visualization. This tool allows her to do this without duplicating the overlapping data set for contact information of colleagues, enabling her to make changes to an item in one visualization and see that change applied to any other visualization that includes the same item. Moreover, users can import data from other sources, as well as share their data with others either with a visualization, such that the receiver can interact with the visualization the user has already created, or as raw data, such that the receiver can create his or her own visualization of the data.
by Jamie Liu.
M.Eng.
Shi, Jiangpeng. "Wearable personal data information capture system." ScholarWorks@UNO, 2004. http://louisdl.louislibraries.org/u?/NOD,172.
Повний текст джерелаTitle from electronic submission form. "A thesis ... in partial fulfillment of the requirements for the degree of Master of Science in the Department of Computer Science."--Thesis t.p. Vita. Includes bibliographical references.
Gwizdka, Jacek, and Mark Chignell. "Individual Differences in Personal Information Management." University of Washington Press, 2007. http://hdl.handle.net/10150/105751.
Повний текст джерелаPenev, Alexander Computer Science & Engineering Faculty of Engineering UNSW. "Search in personal spaces." Awarded by:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/44740.
Повний текст джерелаKhan, Imran. "Personal adaptive web agent for information filtering." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq23361.pdf.
Повний текст джерелаAbrams, David. "Human factors of personal Web information spaces." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ51586.pdf.
Повний текст джерелаElsweiler, David. "Supporting human memory in personal information management." Thesis, University of Strathclyde, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.488520.
Повний текст джерелаKeeble, Richard John. "An adaptive environment for personal information management." Thesis, Brunel University, 1999. http://bura.brunel.ac.uk/handle/2438/6509.
Повний текст джерелаKelin, Sabra-Anne R. (Sabra-Anne Rachel) 1976. "Digital persona : a gateway to personal information." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/9461.
Повний текст джерелаIncludes bibliographical references (p. 101-103).
A Digital Persona (DP) is a gateway to a set of personal information, such as phone numbers and email addresses. Applications and devices which use personal information, such as electronic calendars and cellular phones, can manage this information by using a DP. Information which is accessible through a DP can be stored in the DP itself or in other applications. Since a DP facilitates the transfer of information between devices and applications, a DP can help solve many information management problems, such as handling data with different internal representations. The DP's structured, yet flexible, object model allows di-verse devices and applications to access and update information without being forced to adopt a common object model. This thesis discusses the design of the DP object model and API, as well as the DP's implementation. Implementation details which are covered include object-oriented techniques, reflection, and interfaces.
by Sabra-Anne R. Kelin.
M.Eng.
Katsouraki, Athanasia. "Sharing and Usage Control of Personal Information." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLV089/document.
Повний текст джерелаWe are recently experiencing an unprecedented explosion of available personal data from sensors, web, social networks, etc. and so people feel exposed while they share and publish their data. There is a clear need for tools and methods to control how their data is collected managed and shared. The challenges are mainly focused on the lack of either applications or technical solutions that provide security on how to collect, manage and share personal data. The main challenge is to provide a secure and adaptable tool that can be used by any user, without technical background. This thesis makes three important contributions to the field of privacy: (i) a prototype implementation of the UCONABC model, a usage control model, applied to an online social networks scenario, (ii) an algebraic extension to UCON to control the complex sharing of data (by transforming personal data into sharable and publishable data) and (iii) the design, implementation and field testing of a secure platform to manage sensitive data collected through online forms
Smith, Martin Philip. "The effectiveness of document ranking and relevance feedback techniques in a thesaurus-based search intermediary system." Thesis, University of Huddersfield, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.296001.
Повний текст джерелаTsileponis, Nikolaos. "The impact of the media on the corporate financial information environment." Thesis, University of Manchester, 2017. https://www.research.manchester.ac.uk/portal/en/theses/the-impact-of-the-media-on-the-corporate-financial-information-environment(1f073b0d-750f-4f6c-92d8-7b4c08c39321).html.
Повний текст джерелаPagonis, John. "Evolutionary personal information filtering combating information overload caused by habitual web surfinng using an evolutionary personal content-based recommender system." Thesis, University of Essex, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.536960.
Повний текст джерелаMark, Stephen John. "De-identification of personal information for use in software testing to ensure compliance with the Protection of Personal Information Act." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/63888.
Повний текст джерелаChan, Ching-shun Sabina. "Orientative information in personal narratives and story telling." Click to view the E-thesis via HKUTO, 1995. http://sunzi.lib.hku.hk/hkuto/record/B36209077.
Повний текст джерела"A dissertation submitted in partial fulfilment of the requirements for the Bachelor of Science (Speech and Hearing Sciences), The University of Hong Kong, April 28, 2995." Also available in print.
Atkinson, Shirley. "Risk reduction through technological control of personal information." Thesis, University of Plymouth, 2007. http://hdl.handle.net/10026.1/2135.
Повний текст джерелаGyllstrom, Karl Stotts P. David. "Enriching personal information management with document interaction histories." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2009. http://dc.lib.unc.edu/u?/etd,2727.
Повний текст джерелаTitle from electronic title page (viewed Mar. 10, 2010). "... in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science." Discipline: Computer Science; Department/School: Computer Science.
Sauermann, Leo. "The Gnowsis semantic desktop approach to personal information management weaving the personal semantic web." Berlin dissertation.de, 2009. http://d-nb.info/996092501/04.
Повний текст джерелаRamnerö, David. "Semi-automatic Training Data Generation for Cell Segmentation Network Using an Intermediary Curator Net." Thesis, Uppsala universitet, Bildanalys och människa-datorinteraktion, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-332724.
Повний текст джерелаYiu, Kelvin Shek. "Time-based management and visualization of personal electronic information." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0016/MQ29420.pdf.
Повний текст джерелаGhaly, Marcus. "Thoughtmarks: Re-thinking Bookmarks & the Personal Information Space." Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22962.
Повний текст джерелаBrock, Kathy Thomas. "Developing information literacy through the information intermediary process a model for school library media specialists /." 1993. http://books.google.com/books?id=tLPgAAAAMAAJ.
Повний текст джерелаKipp, Margaret E. I. "Exploring the Context of User, Creator and Intermediary Tagging." 2006. http://hdl.handle.net/10150/105151.
Повний текст джерелаThis paper examines the results of a study of the three groups involved in creating index keywords or tags: users, authors and intermediaries. Keywords from each of the three groups were compared to determine similarities and differences in term use. Comparisons suggested that there were important differences in the contexts of the three groups that should be taken into account when assigning keywords or designing systems for the organisation of information.
Bauer, Mareike Fenja. "Personal Information Management mit Personal Information Management Tools am Beispiel von Evernote." Thesis, 2015. http://eprints.rclis.org/29882/1/Bachelorarbeit_Mareike_Fenja_Bauer.pdf.
Повний текст джерелаCHEN, BAI-HUAN, and 陳柏寰. "Impact of Personal Self-efficacy on the Intermediary between Challenge Pressure Source and Job Involvement." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/ck7t86.
Повний текст джерела康寧大學
企業管理研究所
106
Based on the theory of expectation, this study explores the relationship between challenging stressors, self-efficacy, and job commitment. Through theoretical derivation, this study believes that self-efficacy plays an intermediary role between the challenge-type stress source and the work input. This study conducted a questionnaire survey of public and private medical institutions and care institutions in the northern region. A total of 400 questionnaires were sent and 196 valid questionnaires were collected. The results of the study found that individuals' perceptually-challenged stressors not only positively affect job input, but also have a positive effect on self-efficacy. And personal self-efficacy will positively affect personal job input. After further analysis of this study, we found that individuals' perceptual-challenged stressors will influence the work input through the intermediary mechanism of individual self-efficacy. That is, individual self-efficacy will affect the impact of individual stress on the individual's work commitment. The paper also discusses the practical implications of the findings.
Cheng, Chi-Wen, and 鄭祺文. "Design of Personal Information Agent." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/93192832868394945104.
Повний текст джерела國立交通大學
資訊工程系
88
As the Internet grows rapidly, we can get many information in the Internet. So, it’s more important to find the information that we want. Search engines may help us to find the relative information, it’s still user’s responsibility to actively use it. In this thesis, we design a tool, called Personal Information Agent (PIA), that can actively push information to users. In this thesis, we design a Personal Information Agent framework, it help us to develop the Personal Information Agent application by calling these objects or functions. We also implement a personal information application based on the framework to demonstrate the correctness and feasibility of our system architecture.
Tung, Tse-Hua, and 童子樺. "Personal Health Information Management System." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/32834402189836574756.
Повний текст джерела國立陽明大學
醫學工程研究所
95
We hope to provide a long-term record interface through developing a personal health information management system which includes a physiological database for four chronic diseases(e.g. Heart disease, Hypertension, Metabolism and Asthma) and there relative major physiological parameters(e.g. ECG, Blood Pressure, Blood Glucose, Peak Flow and SPO2.). With Long-term personal records compared with physiology parameters criteria, and assisted with the importance log and the 2nd order curve fitting trends. The characteristic of local database provide the ability to carry personal health record anywhere and help users to provide doctors more aid in diagnostic information which were recorded during non-visiting duration.
Liu, Kai, and 劉凱. "Personal Game Information Management System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/40418613669248659213.
Повний текст джерела義守大學
資訊工程學系碩士班
94
Modern IT technique and broadband network infrastructure make on-line games become one of the high value-added industries. Especially when the market of the broadband network grew rapidly since 2000, not only the market of the on-line games increased in 10 megabyte speed, it also becomes the most favorite entertainment to all ages. Extra information will be adopted during the game playing that makes the users confused to filter and organize the information from the overwhelming Internet information. In order to solve this problem, a system is proposed to let user get the valued knowledge and organize from the Internet via the information fetch. This thesis designs an information objects searching mechanism based on the method of RSS (Really Simple Syndication) to build the personal game knowledge-searching infrastructure as the basis of the game knowledge-searching system design. Valuable game knowledge could be obtained by this personal game knowledge-searching system. Since this system is not restricted by the source or the property of the information, it could be applied in the other system.
沈正祥. "A Study on the Self-determination Right to Personal Information in Personal Information Protection Act." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/ntbdf3.
Повний текст джерела逢甲大學
財經法律研究所
102
In today’s society, privacy infringement can be summarized in three aspects: the internet, electronic products and news media. Technological advancement enables people to chat, contact and even make transaction with people at any corner of the world, without the need to step out of their homes. Even though the person to talk with is far away from them, people can make connection in only several seconds’ time. Nevertheless, while people are glad to share their lives and moods with other people on the internet, they begin to worry that their personal information has been invisibly used by other people. They are also angry with the advertising behavior that uses portraiture right without their consent. Therefore, people also begin to suggest that they should possess the right to make decisions on the collection, handling and use of their personal information. Individuals should be the source of information, and are the final deciders as well. Any collection, handling and use of individuals’ information without their decision making should be prohibited. Just because of this, the paper mainly explores the development of the concept of autonomy of decision-making for personal information, and examines the clauses and stipulations of Taiwan’s newly amended Personal Information Protection Act. After that, the paper uses the theories derived from them as the foundation to review what kind of decision-making and control rights individuals should possess over the collection, handling and use of the related personal information. Possessing these rights, individuals can really control the flow of their personal information. Besides, the fear of inappropriate use of their information can be reduced. Furthermore, the flow of information amongst people can be enhanced. As a result, information can really be properly used and personal privacy can be protected.
Hsu, Ming-yuan, and 徐敏原. "Design and Implementation of a Personal Digital Assistant─Document, Personal Information and Contact Information Management." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/36483169615310001130.
Повний текст джерела國立臺灣科技大學
電機工程系
100
In these years, the smart mobile devices have developed rapidly and spread widely, have became a part of many people’s life. The smart mobile devices can expand the functionality by downloading the applications, such as document management system, password management system and schedule management system, etc. Although there are many kinds of applications, but the application which integrated multiple functions is a handful. This thesis integrated three different types of subsystem, document management subsystem, password management subsystem and contact management subsystem, to develop an iPad personal digital assistant based on iOS. “Document management subsystem” uses the concept of multiuser, combined with cloud services and project and schedule management subsystem. Projects and meetings can attach files from document management subsystem, and users can browse projects or meetings information through the reference files. “Password management subsystem” protects the user password information content by using virtual information and AES encryption. “Contact management subsystem” provides the user to manage personal contact information, users can watch the contact related projects, meetings and photos. This thesis implements a multi-function personal digital assistant through information sharing between each system.
LIN, HSUEH-YUEH, and 林學鉞. "Explore the Relationship between Information Disclosure, Information Intermediary and Stock Price for the Public Employees Pension Fund Investment." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/mumd77.
Повний текст джерела國防大學
財務管理學系
105
Promoting the degree of corporate disclosure information to reduce the investment risk in the stock market has always been an important indicator that government promotes reforms of corporate governance, and financial analysts’ financial reports are not only limited by the degree of transparency, but also significant correlation of the stock price. In this study, we use the Ohlson model as the structure with the information disclosure and the information intermediary, and we want to explore the relationship with stock price. The results show that the ratio of independent directors is positive relationship with stock price, and analysts’ forecast for the stock price also has a significant positive impact. This article explores the situation of the stock market with information disclosure and information intermediary, and that hopes to provide investors with making financial decision.
Chen, Kuei-Fen, and 陳桂芬. "Factors Affecting Personal Health Information Disclosure." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/25384978199805407706.
Повний текст джерела國立交通大學
資訊管理研究所
103
The implementation of electronic medical record (EMR) exchange is an important tread. However, EMR exchange suffers from some problems. For example, concern for health information privacy may cause individuals unwilling to provide personal health information. To better understand individuals’ intention, we tried to examine the correlation between individuals’ concern for information privacy and their intention. Beside this, based on a social exchange theory perspective, the antecedents in organizational dimension of CFIP were examined. In this study, our proposed model was empirically validated by 138 respondents in Taiwan. Four hypotheses were assessed by Structural Equation Modeling (SEM) via statistical analysis software SmartPLS 3.0. Three hypotheses were significant supported which indicate that all of the components of social exchange theory were critical, and the proposed model is applicable in EMR exchange context.
Kim, Jinyoung. "Retrieval and Evaluation Techniquesfor Personal Information." 2012. https://scholarworks.umass.edu/open_access_dissertations/649.
Повний текст джерелаBibi, Khalil. "Personal information prediction from written texts." Thesis, 2020. http://hdl.handle.net/1866/24308.
Повний текст джерелаAuthorship Attribution (AA) is a field of research that exists since the 60s. It consists of identifying the author of a certain text based on texts with known authors. This is done by extracting features about the writing style and the content of the text. In this master thesis, two sub problems of AA were treated: gender and age classification using a corpus collected from online blogs. In this work, several features were compared using several feature-based algorithms. As well as deep learning methods. For the gender classification task, the best results are the ones obtained by a majority vote system over the outputs of several classifiers. For the age classification task, the best result was obtained using classifier trained over TFIDF.
TANG, WEN-TING, and 唐文婷. "Personal Health Blockchain of Integrated Information." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/kbg65c.
Повний текст джерела世新大學
資訊管理學研究所(含碩專班)
107
Currently, personal health information is stored through third-party organizations. In order for people to access their own information, they must go through tedious procedures and spend a significant amount of time and money only to sometimes access data that is incomplete. Through blockchain technology, we can collate all of this health information into one, including, the amount of exercise, disease and diet management. The information will be protected through encryption, non-tampering and decentralization. Users can control these integrated health information without worrying about data being tampered with and/or modified. This creates ease for people to readily be able to access their own heath and medical information and using QR Code to allow different medical practices to access this information with your permission. New data will be transferred into the blockchain through the system or manually. This significantly streamlines the process of accessing medical information between clinics and hospitals regarding treatment, medical history and other data, as you would readily have this information regardless of which medical facility you are accessing.
Marková, Katerina. "Digital dying in personal information management towards thanotosensitive information management." Master's thesis, 2011. http://hdl.handle.net/10216/65334.
Повний текст джерелаMarková, Katerina. "Digital dying in personal information management towards thanotosensitive information management." Dissertação, 2011. http://hdl.handle.net/10216/65334.
Повний текст джерелаParbanath, Steven. "Personal information security : legislation, awareness and attitude." Thesis, 2011. http://hdl.handle.net/10413/9651.
Повний текст джерелаThesis (M.Com.)-University of KwaZulu-Natal, Westville, 2011.
Kao, Chia-Hung, and 高嘉宏. "An Intelligent Architecture for Personal Information Management." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/05154903606991656578.
Повний текст джерела國立中山大學
電機工程學系研究所
90
Abstract As the Internet and wireless technologies become mature, people may use more than one digital device to manage their personal data. However, the complexities and difficulties in personal information management will arise due to various devices and heterogeneous platforms. To cope with this problem, we design an intelligent architecture for personal information management based on the XML-RPC technology, which allows the software running on disparate operating systems and in different environments to make procedure calls over the Internet. We also implement an information server to manage the whole data and handle the synchronization process. The system provides users a simple and convenient environment to manage and synchronize their personal information. Besides, the group facility in this system makes the people in the same group or community capable of sharing their information more easily.