-
1
Communicating the protection of information privacy
Published 2022-10-01Subjects: “…protection of information privacy…”
Get full text
Article -
2
Un hito jurídico sobre Internet de las Cosas: la Ley de California n° 327 del año 2018 vigente a partir del 1 enero del 2020
Published 2020-04-01“…Resumen El objetivo de este artículo consiste en definir el ecosistema denominado Internet de las Cosas y analizar la Ley de California n° 327 Information privacy: connected devices, publicada el 28 de septiembre de 2018 y agregada a la Sección 1, Parte 4 de la División 3 del Código Civil californiano, bajo el título Title 1.81.26. …”
Get full text
Article -
3
Access control security model based on behavior in cloud computing environment
Published 2012-03-01“…In view of the current popular cloud computing technology,some security problems were analyzed.Based on BLP(Bell-LaPadula) model and Biba model,using the access control technology based on behavior to dynamic adjusting scope of subject's visit,it put forward the CCACSM ( cloud omputing access control security model).The model not only guarantees the cloud computing environment information privacy and integrity,and makes cloud computing environment with considerable flexibility and practical.At last,it gives the model's part,safety justice and realization process.…”
Get full text
Article -
4
Research on privacy protection in the process of information exchange
Published 2016-03-01“…Then the current research status of the information privacy awareness, privacy metric, self-adaptive adjustment scheme, privacy splitting and authorization extension were concluded. …”
Get full text
Article -
5
Design of federated routing mechanism in cross-domain scenario
Published 2020-10-01“…With the development of multi-network integration,how to ensure efficient interconnections among multiple independent network domains is becoming a key problem.Traditional interdomain routing protocol fails due to the limitation of domain information privacy,where each autonomous domain doesn’t share any specific intra-domain information.A machine learning-based federated routing mechanism was proposed to overcome the existing shortcomings.Each autonomous domain shares intra-domain information implicitly via neural network models and parameters.It not only breaks data islands problems but also greatly reduces the amount of transmitted data shared between domains,then decreases convergence delay of entire network information.Based on the federated routing mechanism,border routers can formulate global optimal routing strategies according to the status of entire network.…”
Get full text
Article -
6
Privacy computing:concept, connotation and its research trend
Published 2016-04-01“…Then the privacy computing research category will be discussed from the whole life cycle of information privacy protection. Finally, some research directions of privacy computing are given, including privacy computing model, context adaptive cryptology for privacy protection, big data a lytics resisted privacy control and protection, privacy protection based on information hiding and system architecture for high concurrent privacy preserving services.…”
Get full text
Article -
7
The Internet Use for Health Information Seeking among Ghanaian University Students: A Cross-Sectional Study
Published 2017-01-01“…The results show that university students are active users of the Internet as 78.3% (509/650) used Internet daily and 67.7% (440/650) use Internet for health purposes, for reasons including availability and ease of accessing information, privacy, confidentiality, and affordability. …”
Get full text
Article -
8
Effectiveness of Health Management Information System in Selected Sub-Counties of Ryakarimira Town Council and Rubaya Sub-County.
Published 2024“…These challenges included delays in data entry, limited resources for training, occasionally technical issues, infrastructure, and technological constraints, especially in remote areas, and concerns about data security and patient information privacy. The study concluded that the HMIS has been partially ineffective, highlighting the need for standardized tools, comprehensive training programs, and strategic investments to overcome challenges and enhance overall performance. …”
Get full text
Thesis -
9
Barriers facilitators and needs of female sex workers in Arak to access sexual health services a qualitative study
Published 2025-01-01“…Personal barriers included a lack of information, privacy concerns, fear of untreatable or complex diagnoses, and cultural beliefs and shame. …”
Get full text
Article -
10
A Model for Implementing New FinTechs in the Banking Industry (Peer-to-Peer Lending)
Published 2024-06-01“…They found that customers were less likely to adopt fintech services if they reported higher levels of concern about security, information privacy, limited government control, and higher levels of perceived service barriers. …”
Get full text
Article