نتایج جستجو برای: enhancing values

تعداد نتایج: 601335  

2005

One day, you will discover a new adventure and knowledge by spending more money. But when? Do you think that you need to obtain those all requirements when having much money? Why don't you try to get something simple at first? That's something that will lead you to know more about the world, adventure, some places, history, entertainment, and more? It is your own time to continue reading habit....

Journal: :IEICE Transactions 2006
Jeng-Ji Huang Huei-Wen Ferng

It is well known that deploying a proxy at the boundary of wireless networks and the Internet is able to improve the performance of transmission control protocol (TCP) over wireless links. Snoop protocol, acting like a transport layer proxy, performs local retransmissions for packets corrupted by wireless channel errors. In this letter, an improvement for the Snoop protocol is proposed to short...

2015
Chialin Chen Lucy Qian Liu

Design for recycling has been promoted by companies and governments around the world as one of the most important practices for achieving sustainability. The success or failure of such a practice, however, depends heavily on the financial incentives for firms to design products with more recycled or recyclable material contents. An interesting phenomenon that can be observed in many markets wit...

2012
Johannes Paefgen Thorsten Staake Frédéric Thiesse

Ubiquitous IS enables novel services and business models, yet require a careful balancing of consumer privacy concerns (PC) – induced by the provision of particular sensors and information types – with functional performance in order to maximize acceptance. For the exemplary case of Usage-based Insurance (UBI), this paper presents a design science approach to the mitigation of PC under parallel...

Journal: :IJTHI 2005
Sarah Spiekermann

Using privacy and security technology becomes increasingly important in many application areas for companies as well as for consumers. However, the market for privacy-enhancing technologies (PETs) is still small, especially in the private consumer segment. Due to the nature of the technology per se, little is known and can be learned about the views and motivation of those who carefully protect...

2013
Zbigniew Kwecka William J. Buchanan Burkhard Schafer Judith Rauhofer

Dieser Aufsatz beschreibt einen neuen Zugang zu Privacy Enhancing Technologies, der seine rechtstheoretische Motivation aus einem Verständnis der Privatsphäre als kollektivem Gut gewinnt. In diesem Modell willigen alle Mitglieder einer Gruppe in ein theoretisches Risiko ein, um gegenseitig ihre Anonymität und damit einen wesentlichen Aspekt ihrer Privatsphäre zu sichern. .

2000
Giovanni Iachello Kai Rannenberg

In the past independent IT security evaluation according to published criteria has not realized its potential for the assessment of privacy enhancing technologies (PETs). Main reason for this was, that PETs were not covered appropriately in the evaluation criteria. This situation has changed somewhat, and therefore this paper reports on a case study, in which we developed Protection Profiles fo...

2008
Rafael Accorsi

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv 1 Audit: An Approach to Generate Evidence . . . . . . . . . . . . . . . . . . . 1 1.1 IT Audits and their Building Blocks . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.1 Audit and Policy Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.2 A...

2003

An investigation of available and applicable Agent Technologies has been carried out.Goal of the investigation was to determine the usage of the available technologies. Thetechnologies have been investigated and are described per ‘topic’. The following top-ics have been used: ‘Agent platforms’, ‘Agent Mobility’, ‘Standardisation initiatives’,‘Legacy System Integration’, ‘Knowled...

2013
Vaibhav Garg L. Jean Camp

Participation on Online Social Networks (OSNs) inherently requires information sharing and thus exposes individuals to privacy risks. Risk mitigation then has been encouraged through adoption of usable privacy controls. However, stronger privacy enhancing technologies (PETs) decrease both risk and perceptions of risk. Thus, individuals feel safer and may in fact respond by accepting more risk. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید