نتایج جستجو برای: enhancing values
تعداد نتایج: 601335 فیلتر نتایج به سال:
One day, you will discover a new adventure and knowledge by spending more money. But when? Do you think that you need to obtain those all requirements when having much money? Why don't you try to get something simple at first? That's something that will lead you to know more about the world, adventure, some places, history, entertainment, and more? It is your own time to continue reading habit....
It is well known that deploying a proxy at the boundary of wireless networks and the Internet is able to improve the performance of transmission control protocol (TCP) over wireless links. Snoop protocol, acting like a transport layer proxy, performs local retransmissions for packets corrupted by wireless channel errors. In this letter, an improvement for the Snoop protocol is proposed to short...
Design for recycling has been promoted by companies and governments around the world as one of the most important practices for achieving sustainability. The success or failure of such a practice, however, depends heavily on the financial incentives for firms to design products with more recycled or recyclable material contents. An interesting phenomenon that can be observed in many markets wit...
Ubiquitous IS enables novel services and business models, yet require a careful balancing of consumer privacy concerns (PC) – induced by the provision of particular sensors and information types – with functional performance in order to maximize acceptance. For the exemplary case of Usage-based Insurance (UBI), this paper presents a design science approach to the mitigation of PC under parallel...
The Desire for Privacy: Insights into the Views and Nature of the Early Adopters of Privacy Services
Using privacy and security technology becomes increasingly important in many application areas for companies as well as for consumers. However, the market for privacy-enhancing technologies (PETs) is still small, especially in the private consumer segment. Due to the nature of the technology per se, little is known and can be learned about the views and motivation of those who carefully protect...
Dieser Aufsatz beschreibt einen neuen Zugang zu Privacy Enhancing Technologies, der seine rechtstheoretische Motivation aus einem Verständnis der Privatsphäre als kollektivem Gut gewinnt. In diesem Modell willigen alle Mitglieder einer Gruppe in ein theoretisches Risiko ein, um gegenseitig ihre Anonymität und damit einen wesentlichen Aspekt ihrer Privatsphäre zu sichern. .
In the past independent IT security evaluation according to published criteria has not realized its potential for the assessment of privacy enhancing technologies (PETs). Main reason for this was, that PETs were not covered appropriately in the evaluation criteria. This situation has changed somewhat, and therefore this paper reports on a case study, in which we developed Protection Profiles fo...
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv 1 Audit: An Approach to Generate Evidence . . . . . . . . . . . . . . . . . . . 1 1.1 IT Audits and their Building Blocks . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.1 Audit and Policy Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.2 A...
An investigation of available and applicable Agent Technologies has been carried out.Goal of the investigation was to determine the usage of the available technologies. Thetechnologies have been investigated and are described per ‘topic’. The following top-ics have been used: ‘Agent platforms’, ‘Agent Mobility’, ‘Standardisation initiatives’,‘Legacy System Integration’, ‘Knowled...
Participation on Online Social Networks (OSNs) inherently requires information sharing and thus exposes individuals to privacy risks. Risk mitigation then has been encouraged through adoption of usable privacy controls. However, stronger privacy enhancing technologies (PETs) decrease both risk and perceptions of risk. Thus, individuals feel safer and may in fact respond by accepting more risk. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید