Sciweavers

478 search results - page 82 / 96
» Privacy and pricing personal information
Sort
View
CHI
2006
ACM
14 years 9 months ago
Everyday practices with mobile video telephony
The mobile phone allowed people to communicate when and where they wanted, dramatically changing how audio telephony was integrated into daily life. With video telephony services ...
Kenton O'Hara, Alison Black, Matthew Lipson
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
14 years 8 months ago
Anonymizing Weighted Social Network Graphs
The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Although such analysis can facilitate better understan...
Sudipto Das, Ömer Egecioglu, Amr El Abbadi
SEMWEB
2007
Springer
14 years 2 months ago
Access Control for Sharing Semantic Data across Desktops
Abstract. Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obvious...
Ekaterini Ioannou, Juri Luca De Coi, Arne Wolf Koe...
BPM
2007
Springer
258views Business» more  BPM 2007»
14 years 18 days ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
FC
2009
Springer
112views Cryptology» more  FC 2009»
14 years 3 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson