Ad-hoc and situational applications for personal use will gain more and more traction in the work support for knowledge workers (KWers). Personal information is a key element in th...
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
A typical collection of personal information contains many documents and mentions many concepts (e.g., person names, events, etc.). In this environment, associative browsing betwe...
Jinyoung Kim, Anton Bakalov, David A. Smith, W. Br...
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
: Ambient Intelligence scenarios describe situations in which multitude of devices and agents live together. In this kind ofscenarios is frequent to see the appearance ofconflicts ...
Given the significant amount of personal information available on the Web, verifying its correct use emerges as an important issue. When personal information is published, it shoul...
In this paper we experimentally compare the welfare efficiency of ‘information markets’ – markets where consumer information can be traded, to markets where no trade in info...
Personalized services can cause privacy concerns, due to the acquisition, storage and application of sensitive personal information. This paper describes empirical research into th...
Evelien van de Garde-Perik, Boris E. R. de Ruyter,...
This paper presents a plug-in for Mozilla web browser that fetches personal information from a mobile device. Its purpose is to facilitate the repetitive entry of personal informa...