Skip to main content
    • by 
    •   59  
      PrivacyFighting and Preventing Corruption through LawPolitical ScienceSurveillance (Sociology)
This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security, and the right to informational privacy. Given the complexity of the... more
    • by 
    •   26  
      Business EthicsInformation TechnologyLawPhilosophy
Internet Privacy and Myths Third Edition 2016
    • by 
    •   31  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
    • by 
    •   12  
      PrivacyDigital MediaFace RecognitionDigital Media & Learning
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and... more
    • by 
    •   13  
      PrivacyRFID Security and PrivacyInformation Security and PrivacyPrivacy (Law)
    • by 
    •   38  
      Information SecurityDatabase SystemsPrivacyNetwork Security
Il trattamento dei cd. Big Data, per conformarsi al Regolamento europeo sulla protezione dei dati personali, richiede un'indagine preliminare volta a individuare quali siano le misure organizzative e tecniche idonee alla corretta... more
    • by 
    •   19  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name a few. According to recent studies, OSN... more
    • by 
    •   7  
      Social NetworksInformation Security and PrivacySurveySocial Networking Security and Privacy
International Journal of Wireless Network Security (IJWNS) http://flyccs.com/jounals/IJWNS/Home.html Scope International Journal of Wireless Network Security (IJWNS) is a open access journal that publishes articles which contribute... more
    • by 
    •   15  
      Network SecurityGenetic Fuzzy SystemsFuzzy SystemsWireless Sensor Network Security
The goal of the book is to present the latest research on the new challenges of data technologies. It will offer an overview of the social, ethical and legal problems posed by group profiling, big data and predictive analysis and of the... more
    • by  and +1
    •   158  
      PhilosophyPolitical PhilosophyFree Will, Moral ResponsibilityDigital Divide
Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via... more
    • by  and +1
    •   12  
      Information Security and PrivacyCloud ComputingSocial Networking Security and PrivacyAdvanced Persistent Threats
Ao analisar os comportamentos dos utilizadores através das mídias sociais, Hermida (2014) conclui que nestes ambientes observa-se claramente a natural predisposição humana para partilhar. Neste sentido, Rheingold (2012) discrimina cinco... more
    • by 
    •   29  
      PrivacyOnline CommunitiesOnline social networksCommunication Privacy Management
Os estudos das redes sociais como aplicações, meios e plataformas que amoldam a configuração dos nossos perfis e identidades digitais, para além das suas potencialidades para influenciar as nossas identidades online – e offline – (Van... more
    • by 
    •   32  
      Social MovementsSocial TheoryNew MediaDigital Humanities
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more
    • by 
    •   30  
      Wireless CommunicationsNetwork SecuritySensor Network SecurityNext Generation Internet Research
Privacy has been a sensitive question lurking over the head of Indian administrators who have been equally reluctant and ignorant about answering the same. The advent of Aadhaar Act in 2016 and Government's mandate of linking Aadhaar with... more
    • by 
    •   37  
      Risk Management and InsuranceLawCriminal LawConstitutional Law
Some theoretical and practical aspects of the legal mechanism of the mutual approximation and interpenetration of the Ukrainian social security system and the European Community are clarified. The mechanism of the implementation into... more
    • by 
    •   9  
      Social WorkSocial SciencesSocial Security LawSocial Security
    • by 
    •   11  
      PrivacyRight to Information ActInformation Security and PrivacySurveillance, personal data, social sorting, privacy, camera surveillance, identification systems, internet surveillance, biometrics
    • by 
    •   8  
      Self and IdentitySystem IdentificationSocial IdentityPrivacy
Few would deny that monitoring employees is a necessary part of doing business. The very act of paying someone for services would necessitate, in a competitive environment, that the product produced or time spent working be observed.... more
    • by 
    •   15  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
In this article, after a brief survey of various definitions, I will offer and defend a control over access and use account of privacy. My goal is to provide a normative definition of privacy although I will sketch a descriptive account... more
    • by 
    •   12  
      PrivacyRFID Security and PrivacyInformation Security and PrivacyPrivacy (Law)
In this paper I will offer several arguments in support of the view that individuals have moral claims to control personal information. Coupled with rights to control access to one's body, capacities, and powers, or physical privacy... more
    • by 
    •   19  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
€50.000.000 that fined to Google by the French authorities in consequence of the breach of the GDPR demonstrates the GDPR’s quick entrance to the field, which has been in force for only less than a year. Thereby, the first major breach... more
    • by 
    •   18  
      PrivacyIT lawPERSONAL DATA PROTECTIONInformation Security and Privacy
While the balance between individual privacy and government monitoring or corporate surveillance has been a frequent topic across numerous disciplines, the issue of privacy within the family has been largely ignored in recent privacy... more
    • by  and +1
    •   8  
      PrivacyInformation Security and PrivacyPrivacy (Law)Security and Privacy
14 th International Conference on Networks & Communications (NeCoM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Networks & Data Communications.... more
    • by 
    •   12  
      Wireless Sensor Network SecurityNetwork Security (Networks)Networks SecurityComputer and Network Security Information Assurance and Security Cyber Security Access Control in Collaborative, Mobile, Pervasive and Grid Systems Semantic Web and Security Ontologies
    • by 
    •   30  
      Computer Security And ReliabilityNetwork SecurityComputer SecurityUsable Security (Computer Security)
I have argued elsewhere that individuals have moral privacy rights that limit the surveillance activities of governments. While not absolute, privacy rights shield individuals from the prying eyes and ears of neighbors, corporations, and... more
    • by 
    •   18  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
The patient-related data stored in the WBSN plays an important role in medical diagnosis and treatment; hence it is essential to ensure the security of these data. Access to patient-related data must be strictly limited only to authorized... more
    • by  and +1
    •   15  
      Network SecurityWireless Sensor Network SecurityNetwork Security (Networks)Encryption
This article examines the evolution of social security research from a theoretical and empirical perspective. This is done through an extensive review and analysis of publications from the Journal of International Social Security Review... more
    • by 
    •   7  
      Political ScienceSocial ProtectionSocial SecuritySocial Networking Security and Privacy
In this paper we describe Turtle, a peer-to-peer architecture for safe sharing of sensitive data. The truly revolutionary aspect of Turtle rests in its novel way of dealing with trust issues: while existing peer-to-peer architectures with... more
    • by 
    •   10  
      PrivacySecurity in routing protocolsSocial Networking Security and PrivacyFile Sharing
Le géant de Web a annoncé supprimer désormais toutes les données de recherche faites par les internautes vieilles de plus de 18 mois. Une mesure en trompe l’oeil.
    • by 
    •   12  
      PrivacyInformation Security and PrivacySecurity and PrivacyGoogle
The number of services and smart devices which require context is increasing, and there is a clear need for new security policies which provide security that is convenient and flexible for the user. In particular, there is an urgent need... more
    • by 
    •   11  
      Network SecurityWireless Sensor Network SecurityNetwork Security (Networks)Computer and Network Security
Ensuring privacy of users of social networks is probably an unsolvable conundrum. At the same time, an informed use of the existing privacy options by the social network participants may alleviate-or even prevent-some of the more drastic... more
    • by 
    •   18  
      Computer ScienceSocial NetworksData MiningSocial Networking
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific... more
    • by 
    •   84  
      Mobile Ad Hoc NetworksNetwork SecuritySecurity in Sensor NetworksVehicular Ad Hoc Networks
The primary contribution of this research is the production of a general cloud robotics architecture that leverages the established and evolving big data technologies. Prior research in this area has not released all details of their... more
    • by  and +2
    •   20  
      RoboticsEmbedded SystemsRosicrucianismInformation Security and Privacy
AMAZON ECHO IN DORM ROOMS AND PRIVACY CONCERNS Aug-28-2018 As the fall semester begins, students of Saint Louis University will soon find a new amenity, the Amazon Echo Dot, in each of their dorm rooms. Echo Dot is a voice assistant... more
    • by 
    •   20  
      Social NetworksInformation SecurityPrivacyEducational Research
The Internet today connects about 40% of the world population. Half of these are living outside the advanced economies, often in some countries that are quickly climbing the developmental ladder, with diverse populations and inarguable... more
    • by 
    •   17  
      SecuritySocial Networking Security and PrivacyMobile Computing and Wireless Communications, Information Security and Privacy, Digital Enterprises, Digital Governments, Digital Health.Data Security and Privacy Policy
The phenomenon of big data includes technological (new opportunities), business (application), and social aspect. The social aspect applies to the social consequences of the use of big data methods, in particular, those related to the... more
    • by 
    •   9  
      PrivacyInformation Security and PrivacyPrivacy and data protectionData Privacy
This article examines the evolution of social security research from a theoretical and empirical perspective. This is done through an extensive review and analysis of publications from the Journal of International Social Security Review... more
    • by  and +1
    •   5  
      Social ProtectionSocial SecuritySocial Networking Security and PrivacySocial protection policy
This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy,... more
    • by 
    •   18  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
HUMAN ERRORS AND THE COMPUTER FRAUD AND ABUSE ACT (CFAA) Mar-14-2018 Humans and computers are alike in at least one sense –both could malfunction or be compromised. On Feb. 28th, the U.S. Marine Forces Reserve announced a data breach... more
    • by 
    •   20  
      Information SecurityPrivacyNetwork SecurityInternational Security
International Journal of Wireless Networks Systems (IJWNS)is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all... more
    • by 
    •   12  
      Network SecurityGenetic Fuzzy SystemsFuzzy SystemsRFID Security and Privacy
    • by 
    •   9  
      BusinessTechnologySocial SciencesPrivacy
Abstract: Participation in social networking sites has dramatically increased in recent years. Social networking sites like Facebook1 or MySpace allow users to keep in touch with their friends, communicate and share content, ideas,... more
    • by 
    •   3  
      Design PatternsSocial Network Security and Privacy SurveyMalicious
Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name a few. According to recent studies, OSN... more
    • by 
    •   12  
      Distributed ComputingSocial NetworksPrivacyComputer Security
International Journal of Wireless Networks Systems (IJWNS)is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all... more
    • by 
    •   10  
      Network SecurityWireless Sensor Network SecurityNetwork Security (Networks)Computer and Network Security
Online Social Networking has gained tremendous popularity amongst the masses. It is usual for the users of Online Social Networks (OSNs) to share information with friends however they lose privacy. Privacy has become an important concern... more
    • by 
    •   10  
      Network SecurityEthnical Data CollectionData Collection, Human Skeletal Remains; Intersection Of Pathological And Biomechanical Bone Response; Retention Of Remains For ResearchSocial Network Security and Privacy Survey
Now a days, to know the users location information on devices having GPS facility. When user’s location is provided to LBS, it is possible to user to know all location dependent information like location of friends or Nearest Restaurant,... more
    • by 
    •   3  
      Information Security and PrivacySocial Networking Security and PrivacySocial Network Security and Privacy Survey
This seminar provides an overview of evidence collected across Europe’s 27 Member States (excluding Croatia) on citizens’ preferences between security and privacy in three real-life contexts: (1) Choice of Internet service provider, (2)... more
    • by 
    •   12  
      Information SecurityPrivacyNetwork SecurityInternational Security