Sciweavers

662 search results - page 44 / 133
» Adventures in Personalized Information Access
Sort
View
CSFW
2006
IEEE
14 years 1 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
WPES
2005
ACM
14 years 1 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
CHI
2009
ACM
13 years 11 months ago
Yours, mine and (not) ours: social influences on group information repositories
Group information repositories are systems for storing and organizing files in a central location all group members can access. The functionality and capabilities of these systems...
Emilee Rader
HICSS
2007
IEEE
122views Biometrics» more  HICSS 2007»
14 years 2 months ago
False Information in Internet Auction Communities
As one of the most important features, the Internet enables individuals to make their personal thoughts and opinions easily accessible to the global community of Internet users. N...
Oliver Hinz
ERCIMDL
2007
Springer
114views Education» more  ERCIMDL 2007»
13 years 11 months ago
Semantics and Pragmatics of Preference Queries in Digital Libraries
As information becomes available in increasing amounts, and to growing numbers of users, the shift towards a more user-centered, or personalized access to information becomes cruci...
Elhadji Mamadou Nguer