Sciweavers

478 search results - page 61 / 96
» Privacy and pricing personal information
Sort
View
CHI
2008
ACM
14 years 9 months ago
The cost of interrupted work: more speed and stress
We performed an empirical study to investigate whether the context of interruptions makes a difference. We found that context does not make a difference but surprisingly, people c...
Gloria Mark, Daniela Gudith, Ulrich Klocke
JCS
2008
88views more  JCS 2008»
13 years 8 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
TRUSTBUS
2010
Springer
13 years 7 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 5 months ago
FauxCrypt - A Method of Text Obfuscation
Warnings have been raised about the steady diminution of privacy. More and more personal information, such as that contained electronic mail, is moving to cloud computing servers ...
Devlin M. Gualtieri
ECSCW
2001
13 years 10 months ago
Community support and identity management
Computer based community support systems can provide powerful support in direct exchange of information and in finding people for information exchange Such applications usually mak...
Michael Koch, Wolfgang Wörndl