Skip to main content
    • by 
    •   59  
      PrivacyFighting and Preventing Corruption through LawPolitical ScienceSurveillance (Sociology)
Conferência ao IV Congresso Interativo Virtual "Humanos Direitos Máquinas - amigos ou inimigos". Universidad Nacional de Lanús / E-Justicia Latinoamérica, Argentina. Dia 20 de novembro de 2019. A mesma retoma a comunicação apresentada na... more
    • by 
    •   17  
      PrivacyIT lawPERSONAL DATA PROTECTIONEuropean Union Law
With the pace of increasing online transactions and communication, the demand for security and privacy increases. To protect confidential information and to authenticate people electronically, several solutions already introduced.... more
    • by 
    •   4  
      Security and PrivacyProceedingsBit Error RateBiometric Authentication
This paper summarizes the ideas and results of three working groups that convened during the 1st International Conference on Security in Pervasive Computing. The scope of the workshop was to identify and discuss security and privacy... more
    • by 
    •   3  
      Pervasive ComputingSecurity and PrivacySPC
This essay aims to address a general conception of what privacy is, as well as an analysis of the challenges and dangers of living without privacy and the importance of data protection against the breakdown of traditional paradigms by new... more
    • by 
    •   17  
      Information SecurityPrivacyData ManagementCyberculture
    • by 
    •   2  
      Security and PrivacyWorld Wide Web
Radio-Frequency Identification (RFID) is going to be the preferred technology for the realization of Machine Readable Travel Documents (MRTDs), and has been deployed in the last generation of e-passports. The proposed technical... more
    • by 
    •   5  
      Access ControlSecurity and PrivacyRadio Frequency IdentificationNext Generation
... for FISMA (Federal Information Security Management Act) compliance for its Cloud-Computing services in order to be acceptable for the public sector[17]. ... 17. Howard, AB, FISMA compliance for federal cloud computing on the horizon... more
    • by 
    •   6  
      Information TechnologyInformation AssuranceCloud ComputingSecurity and Privacy
Este livro é destinado a estudantes, pesquisadores, profissionais e demais interessados em comércio eletrônico (e-commerce), e faz um resgate histórico do surgimento das compras on-line, sua evolução no decorrer dos anos, além de explanar... more
    • by 
    •   38  
      MarketingInformation SecurityInternet StudiesPrivacy
Anomaly detection in a wireless sensor network (WSN) is an important aspect of data analysis in order to identify data items that significantly differ from normal data. A characteristic of the data generated by a WSN is that the data... more
    • by 
    •   34  
      Distributed ComputingArtificial IntelligenceGame TheoryRemote Sensing
Despite years of heavy criticism, privacy self-management (i.e., the principle that people individually manage their privacy via notice and choice) remains the standard of privacy protection throughout the Western world. Building on... more
    • by 
    •   12  
      PrivacyPERSONAL DATA PROTECTIONInformation Security and PrivacyPrivacy (Law)
Current mechanisms for authenticating communication between devices that share no prior context are inconvenient for ordinary users, without the assistance of a trusted authority. We present and analyze Seeing-Is-Believing, a system that... more
    • by 
    •   20  
      Computer VisionComputer SecurityMachine VisionCryptography
Public opinion is the belief or thought of a group of people regarding a particular topic, especially on politics, religion, social issues, demographic diversity, etc. The opinion of the individual may be sensitive since it reflects the... more
    • by 
    •   8  
      Electronic VotingComputer SecurityInformation Security and PrivacySecurity and Privacy
Intrusion detection system (IDS) is essential for the network; the intruder can steal sensitive information about networks. The IDS must have the ability to take care of large and real-time data. The predicted rate must be high based on... more
    • by 
    • Security and Privacy
Medical cyber-physical systems (MCPS) are lifecritical, context-aware, networked systems of medical devices. These systems are increasingly used in hospitals to provide highquality continuous care for patients. The need to design complex... more
    • by 
    •   13  
      Biomedical EngineeringPrincipal Component AnalysisSecurity and PrivacyCyber Physical Systems
Abstract: - Radio Frequency Identification (RFID) technology is emerging as an important tool with applications in a variety of fields. The major concern regarding RFID is the ubiquitous nature of its deployment that extends far beyond... more
    • by 
    •   3  
      Security and PrivacyRadio Frequency IdentificationRfid Tag
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes... more
    • by 
    •   20  
      Distributed ComputingPhysicsSecuritySensor Network Security
Internet Privacy and Myths Third Edition 2016
    • by 
    •   31  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
Within the next year, travelers from dozens of nations may be carrying a new form of passport in response to a mandate by the United States government. The e-passport, as it is sometimes called, represents a bold initiative in the... more
    • by 
    •   9  
      PrivacyBiometricsSecurity and PrivacyAuthentication
Cloud computing is one of the fastest emerging technologies; it gains wide acceptance from various Business organizations & Information Technology (IT) Industries. Cloud computing provides various services to users through the internet;... more
    • by 
    •   3  
      Information Security and PrivacyCloud ComputingSecurity and Privacy
    • by 
    •   20  
      Computer ScienceDistributed ComputingInformation SecurityPrivacy
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and... more
    • by 
    •   13  
      PrivacyRFID Security and PrivacyInformation Security and PrivacyPrivacy (Law)
    • by 
    •   10  
      TechnologyPrivacySocial MediaSecurity and Privacy
Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for the IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture,... more
    • by 
    •   12  
      Information SystemsComputer ScienceInformation SecurityComputer Networks
In recent years, deceptive content such as fake news and fake reviews, also known as opinion spams, have increasingly become a dangerous prospect for online users. Fake reviews have affected consumers and stores alike. Furthermore, the... more
    • by 
    • Security and Privacy
Cloud consumers are hesitant in choosing an appropriate cloud service as they are under the assumption that clouds are not safe for their data and operations. This is due to the presence of a trust gap between cloud service consumers and... more
    • by 
    •   5  
      Service Oriented ComputingCloud ComputingSecurity and PrivacyEconomics of Cloud Computing
Palestra / Conferência na Oficina "Lei Geral de Proteção de Dados (LGPD)", integrada no Congresso 'Universitas' e Direito da Escola de Direito da Pontifícia Universidade Católica do Paraná, Curitiba. Dia 10 de novembro 2020.
    • by 
    •   14  
      European LawPrivacyPERSONAL DATA PROTECTIONEuropean Union Law
Privacy is currently at the centre of a fierce battle. On one side, powerful data companies like Google, Facebook, and major data brokers are collecting and analysing as much personal data as they can. They are lobbying governments around... more
    • by 
    •   14  
      Artificial IntelligenceEthicsPrivacyInformation Ethics
... For example, tourists need indoor navigation services in some large museums to see the artifacts in different places in sequence. In addition, posi-tion information brings benefits to self-organization and self-formation of ad hoc... more
    • by 
    •   10  
      Distributed ComputingIndoor PositioningLocation-AwarenessSecurity and Privacy
Primeira Palestra / Conferência de duas sobre "A Anonimização, Pseudonimização e Cifragem: alguns apontamentos comparativos entre o RGPD e a LGPD", para a Comissão de Direito Digital da Subseção de Campinas da Ordem dos Advogados do... more
    • by 
    •   20  
      PrivacyIT lawPERSONAL DATA PROTECTIONEuropean Union Law
    • by 
    •   6  
      Information Security and PrivacySecurity and PrivacyOnline PrivacyData Protection
The purpose of this paper is to present a set of well-investigated Internet of Things (IoT) security guidelines and best practices that others can use as a basis for future standards, certifications, laws, policies and/or product... more
    • by  and +2
    •   40  
      AlgorithmsInformation TechnologyTechnologyInformation Security
"In The Crowdsourced Panopticon: Conformity and Control on Social Media, Jeremy Weissman explores the role of ‘peer-to-peer’ surveillance through social media and how this is increasingly shaping our behaviour. This is a welcome addition... more
    • by 
    •   10  
      PhilosophyPhilosophy of TechnologyMedia StudiesPrivacy
    • by 
    •   17  
      Information SystemsInformation ManagementPrivacySecurity and Privacy
Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, we... more
    • by 
    •   16  
      Distributed ComputingNetwork SecurityConditional Random FieldsSecurity and Privacy
    • by 
    •   38  
      Information SecurityDatabase SystemsPrivacyNetwork Security
Topics of interest include but are not limited to:  Social media/networks literacy (e.g., critical thinking, scams, phishing)  Social media/networks users (e.g., QOL, FOMO, addiction, cyberbullying, trolling, social distancing,... more
    • by 
    •   16  
      Social NetworksSocial IdentityCritical ThinkingConspiracy Theories
This paper aims to review and evaluate the vision, the objectives and the strategic framework of e-Government in Singapore. Rapidity, Reliability, Efficiency, Cost-effectiveness, Customer-orientation and Accessibility are the main... more
    • by 
    •   9  
      Economic policyCustomer OrientationContinuous ImprovementSecurity and Privacy
Angeles (UCLA). Thank you to the dedicated Federal Communications Law Journal staff for bringing this Note to publication. Special thanks to Meredith Rose, Journal Adjunct, and Atena Sheibani-Nejad, Notes Editor, for their patience and... more
    • by 
    •   15  
      Information TechnologyCriminal LawCopyrightPrivacy (Law)
Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, a major barrier for cloud adoption is real and perceived lack of security. In this paper, we take a... more
    • by 
    •   9  
      Access ControlTrusted ComputingCloud ComputingSecurity and Privacy
Il trattamento dei cd. Big Data, per conformarsi al Regolamento europeo sulla protezione dei dati personali, richiede un'indagine preliminare volta a individuare quali siano le misure organizzative e tecniche idonee alla corretta... more
    • by 
    •   19  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
Internet banking is a form of self service technology. The numbers of Internet users have increased dramatically, but most of them are reluctant to provide sensitive personal information to websites because they do not trust e-commerce... more
    • by 
    •   5  
      Security and PrivacyE-BankingSenior CitizensBUYING BEHAVIOUR
2007 was the year of online gaming fraud-with malicious programs that specifically target online games and virtual worlds increasing by 145% and the emergence of over 30,000 new programs aimed at stealing online game passwords. Such... more
    • by 
    •   5  
      Access ControlVirtual WorldsSecurity and PrivacyOnline Game
Note: my article is at page 15. I was quoted in the Conversation at http://theconversation.com/snowden-report-calls-out-australias-inadequate-privacy-law-27856
    • by 
    •   13  
      CyberlawPrivacyInternet LawSurveillance Studies
Conferência proferida na Escola Superior de Enfermagem do Porto, no dia 2 de maio de 2016..
    • by 
    •   13  
      PrivacyPERSONAL DATA PROTECTIONEuropean Union LawInformation Security and Privacy
Wireless sensor networks (WSNs) have attracted a lot of interest over the last decade in wireless and mobile computing research community. Applications of WSNs are numerous and growing, which range from indoor deployment scenarios in the... more
    • by 
    •   28  
      Distributed ComputingSecurityWireless Sensor NetworksSensor Network Security
The goal of the book is to present the latest research on the new challenges of data technologies. It will offer an overview of the social, ethical and legal problems posed by group profiling, big data and predictive analysis and of the... more
    • by  and +1
    •   158  
      PhilosophyPolitical PhilosophyFree Will, Moral ResponsibilityDigital Divide