نتایج جستجو برای: privacy protection
تعداد نتایج: 218145 فیلتر نتایج به سال:
The invisible remote photoplethysmography (rPPG) signals in facial videos can reveal the cardiac rhythm and physiological status. Recent studies show that rPPG is a non-contact way for emotion recognition, disease detection, biometric identification, which means there potential privacy problem about information leakage from videos. Therefore, it essential to process prevent extraction privacy-s...
The purpose of this essay is to investigate the privacy concerns of Chinese, and to develop relevant protective measures. The groups are divided into two parts by gender and six parts by ages to analyze the different gender and different age groups of privacy concerns. The significance of this study is protecting personal data property. The data of personal information after finishing processin...
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. A number of heuristic solutions have been proposed that satisfy a privacy-protection property called k-Anonymity. These solutions use generalization (e.g., transform Federal Government and Local Government into a less ...
The paper examines the relation between the realms of privacy and civil society by analyzing the recent history of privacy legislation in general and the developments in Switzerland since the 1970s in particular. It argues that the conceptual distinction between the spheres of privacy, civil society and the state should not entice to ignore the interactions and interdependencies between these s...
The right to privacy is a firmly entrenched democratic principle that has been inferred in the U.S. Constitution and protected by the Fourteenth Amendment as a liberty of personal autonomy.I Although the Constitution does not include language that explicitly details privacy protections, since the 1800s justices have interpreted the text as promoting the "right to be left alone."2 Evidence of co...
When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PII). What is often overlooked is consideration for the operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of computing environments has not b...
Does privacy protection matter in the internet of things (IoT) including consumer electronics (CE)? So what is privacy, how is it valued and where does it sit in your organization today? Chances are if you don’t have a chief privacy officer or data protection officer, your company is lacking in protecting critical data, let alone all the laws and statutory regulations dealing with privacy (e.g....
The growth of the Internet has been accompanied by the growth of Web services (e.g., e-commerce, e-health, etc.), leading to important provisions put in place to protect the privacy of Web service users. However, it is also important to be able to estimate the privacy protection capability of a Web service provider. Such estimates would benefit both users and providers. Users would benefit from...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید