Sciweavers

1040 search results - page 47 / 208
» Privacy for Telecom Services
Sort
View
INTERACT
2007
13 years 10 months ago
Do I Do What I Say?: Observed Versus Stated Privacy Preferences
Abstract. This paper examines the use of surveys in measuring privacy concerns in ubiquitous computing environments. Two evaluation techniques are used to study the privacy concern...
Kay Connelly, Ashraf Khalil, Yong Liu
CSE
2009
IEEE
14 years 4 months ago
FaceCloak: An Architecture for User Privacy on Social Networking Sites
—Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, pri...
Wanying Luo, Qi Xie, Urs Hengartner
UM
2009
Springer
14 years 3 months ago
Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure
This paper describes the evaluation of a Scrutable User Modelling Infrastructure. SUMI is intended to form a service to allow users to share their user models from social e-network...
Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropa...
JTAER
2007
78views more  JTAER 2007»
13 years 9 months ago
A System for Locating Mobile Terminals with Tunable Privacy
A number of approaches for capturing and processing location information of mobile users have been proposed in the past; however, only with the latest advances in the handset tech...
Sandford Bessler
GIL
2011
12 years 9 months ago
Business Process Support using RFID-based Information Services in the Distribution of Fresh Fruits and Vegetables
: The efficient distribution of fresh produce poses many challenges to enterprises in the fruit and vegetable sector. The exchange of product- and processrelated information betwee...
Robert Reiche, Richard J. Lehmann, Melanie Fritz, ...