نتایج جستجو برای: respecting privacy
تعداد نتایج: 49155 فیلتر نتایج به سال:
Background and purpose: The need for privacy is a basic human right. Nurses are expected to respect the patients’ privacy. This study investigated the viewpoints of patients and nurses regarding keeping the patients’ privacy during nursing care. Materials and Methods: In this cross sectional study 127 nurses and 384 patients meeting the criteria for study were selected through randomized sampl...
By the events in the past years, the integration of data protection mechanisms into information systems becomes a central research problem again. In this poster, we show how query rewriting can be used to maintain privacy of users in smart (or assistive) environments. We developed a privacy respecting query processing and a vertical fragmentation of queries, processing maximal parts of the quer...
Connecting soft arc consistency with distributed search in DCOP solving has been very beneficial for performance. However, including higher levels of soft arc consistency breaks usual privacy requirements. To avoid this issue, we propose to keep different representations of the same problem on each agent, on which soft arc consistencies are enforced respecting privacy. Deletions caused in one r...
Privacy-respecting reputation systems have been constructed based on anonymous payment systems to implement raters' anonymity for privacy-respecting reputation systems. To the best of our knowledge, all these systems suffer from the problem having a " final state " , that is a system state in which users have no incentive any longer to behave honestly , because they reached a maximum reputation...
Respecting and enabling an individual's right to privacy and dignity is an essential part of professional practice. Older people and their supporters face many challenges as part of the ageing process. The key role of nurses is to ensure that, as part of their therapeutic care, people can expect freedom from intrusion and be regarded as worthy of respect. This paper outlines some strategies tha...
This special issue facilitates a dialog between researchers and practitioners toward informing the development of tools, techniques, other support mechanisms that are valuable to security privacy workers, leading more usable, secure, privacy-respecting solutions for end users.
We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work on privacy respecting intrusion detection for centralized systems we propose an extended functional model for information reductions that is used for cooperation between intrusion detection agents. The reductions have the foll...
Purpose The purpose of this paper is to defend the notion “trust in technology” against philosophical view that concept misled and unsuitable for ethical evaluation. In contrast, it shown “trustworthy addresses a critical societal need digital age as inclusive IT-security risks not only from technical but also public layperson perspective. Design/methodology/approach From an interdisciplinary p...
In February 2012, the Obama White House endorsed a Privacy Bill of Rights, comprising seven principles. The third, "Respect for Context," is explained as the expectation that "companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data." One can anticipate the contested interpretations of this principle as parties repr...
Internet (or online) communities gain more and more significance in the life of many people who do not have enough time or the opportunity to share their interests with people having the same interests in the real world. The term ”virtual community” or ”online community” was introduced by Howard Rheingold [5] already 1993. At this time communities still often were formed by only a small number ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید