Sciweavers

478 search results - page 27 / 96
» Privacy and pricing personal information
Sort
View
ACSAC
2008
IEEE
13 years 11 months ago
Preventing Information Leaks through Shadow Executions
A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer's server...
Roberto Capizzi, Antonio Longo, V. N. Venkatakrish...
DRM
2006
Springer
14 years 1 months ago
Vicarious infringement creates a privacy ceiling
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver
PERCOM
2009
ACM
14 years 10 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 7 months ago
Personalized Data Set for Analysis
Data Management portfolio within an organization has seen an upsurge in initiatives for compliance, security, repurposing and storage within and outside the organization. When suc...
Vishal Gupta, Ashutosh Saxena
KES
2008
Springer
13 years 9 months ago
Evaluation of a Prototype of the Mimamori-care System for Persons with Dementia
We aim to clarify the requirements for the mimamori-care system in the group home to support caregivers who take care of persons with dementia (PWD). We investigated the effects of...
Taro Sugihara, Kenichi Nakagawa, Tsutomu Fujinami,...