نتایج جستجو برای: privacy regulation

تعداد نتایج: 594090  

2016

The University of Guelph is an autonomous institution incorporated under the University of Guelph Act (1964) and is supported, in part, by public funds. Within this context, the University operates with a high degree of self-regulation and accountability. Effective June 10, 2006, the University’s guidelines on “Protection of Privacy and Access to Information” will be overtaken by the fact that ...

2016

The University of Guelph is an autonomous institution incorporated under the University of Guelph Act (1964) and is supported, in part, by public funds. Within this context, the University operates with a high degree of self-regulation and accountability. Effective June 10, 2006, the University’s guidelines on “Protection of Privacy and Access to Information” will be overtaken by the fact that ...

2015
Simeon Schudy Verena Utikal

Privacy regulations can affect the willingness to collect personal health data that may be disclosed to insurers. Perfect privacy cannot always be guaranteed. Consequently, people may refrain from collecting personal health data. This paper provides a theoretical and experimental analysis of the importance of privacy regulations for information acquisition and disclosure behavior. We contrast t...

Journal: :isecure, the isc international journal of information security 0
s. sajjadi ghaemmaghami department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran a. haghbin department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran m. mirmohseni department of electrical engineering, sharif university of technology, tehran, iran

radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...

ژورنال: حیات 2010
آقاجانی, محمد, دهقان‌نیری, ناهید,

Background & Objective: Privacy is a basic humanity principle. Protecting patients;apos privacy is a necessity in health care organizations and along with the patients;apos satisfaction, is one of the main indicators of quality of care. The objective of this study was to assess patients;apos privacy protecting by medical staff and its relation to patients;apos satisfaction.Methods & Materials: ...

2012
Pan Shi Heng Xu Cheng Zhang

Privacy is widely viewed as an interpersonal boundary regulation process in the context of online social networks (OSNs). Mediated by technologies provided by the OSNs, users manage both identity information and social relationships on OSNs. While previous studies mainly focus on users’ information sharing and disclosure behaviors from an individual perspective, this work looks into the social ...

2016
Thibaud Antignac Riccardo Scandariato Gerardo Schneider

Handling personal data adequately is one of the biggest challenges of our era. Consequently, law and regulations are in the process of being released, like the European General Data Protection Regulation (GDPR), which attempt to deal with these challenging issue early on. The core question motivating this work is how software developers can validate their technical design vis-a-vis the prescrip...

Journal: :حقوق اسلامی 0
جلیل قنواتی استادیار دانشگاه تهران ـ پردیس قم حسین جاور استادیار دانشگاه حضرت معصومه

0

2008
Heng Xu Mary Beth Rosson John M. Carroll

Recent advances in wireless computing and communication have led to the proliferation of location-based services (LBS). While LBS offer users the flexibility of accessing network services on the move, potential privacy violations have emerged as a contentious issue because details of user identities, movements and behaviors are available to LBS providers. Drawing on the economic exchange and so...

Journal: :CoRR 2014
Ahmed M. Elmisery Seungmin Rho Dmitri Botvich

Nowadays, it is crucial to preserve the privacy of end-users while utilizing a third-party recommender service within content distribution networks so as to maintain their satisfaction and trust in the offered services. The current business model for those recommender services is centered around the availability of users’ personal data at their side whereas consumers have to trust that the reco...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید