Publishing Risks

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Privacy Risks of Publishing Anonymized IP Network Traces

Networking researchers and engineers rely on network packet traces for understanding network behavior, developing models, and evaluating network performance. Although the bulk of published packet traces implement a form of address anonymization to hide sensitive information, it has been unclear if such anonymization techniques are sufficient to address the privacy concerns of users and organiza...

متن کامل

25 years of regular publishing

25 years of regular publishing Iranian Journal of Physics Research has been publishing since 1996. We are giving a short report on this experience and the progress of IJPR.

متن کامل

Academic publishing is electronic publishing

Derk Haank began by saying that he wanted to keep his presentation simple and would make only a few statements. The first of these was to say that, although it might be stating the obvious, academic publishing is electronic publishing. It has been remarkable how quickly things have progressed since the invention of the Web, and an EC study recently recognised that the revolution in electronic p...

متن کامل

Digital publishing in the faculties of arts and humanities: prospects, chances, and risks

As access to the internet has become absolutely common and data throughput has increased enormously by new transmission techniques, online accessible texts have more and more become an alternative to scientific publishing in books, anthologies, and journals. Texts that are openly accessible in online journals, forums for discussions, on university servers or on the personal homepage of a scient...

متن کامل

Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties

Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-processed to obtain trajectories which are sequences of spatio-temporal data points belonging to a moving object. Recently, advanced data mining techniques have been developed for extracting patterns from moving object trajectories t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Risks

سال: 2014

ISSN: 2227-9091

DOI: 10.3390/risks2010001