Showing 1 - 10 of 128
International Relations theory of constructivism.NormSim explores the metastable dynamics of norms through the interactions …
Persistent link: https://www.econbiz.de/10009458907
Control theory has seldom been used as an analytical tool in pedagogical research for modeling, analyzing or designing effective educational processes, despite its proven benefits in other social sciences, especially economics and finance. In this paper, we use the elements of open-loop and...
Persistent link: https://www.econbiz.de/10009461081
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information Technology and the increasing collection and use of...
Persistent link: https://www.econbiz.de/10009434833
disadvantages such as security, privacy, reliability, physical location of data and the unavailability of service due to crashes or …
Persistent link: https://www.econbiz.de/10009434867
When considering information security and privacy issues most of the attention has previously focused on data … operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of … new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and …
Persistent link: https://www.econbiz.de/10009434918
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information Technology and the increasing collection and use of...
Persistent link: https://www.econbiz.de/10009434924
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating...
Persistent link: https://www.econbiz.de/10009434970
When considering information security and privacy issues most of the attention has previously focussed on data … operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of … new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and …
Persistent link: https://www.econbiz.de/10009434971
incorporation of IT Security measures in each SDLC phase is also discussed. This is due to its direct relevance and correlation with … information system privacy issues. The proposed methodology involves identifying the privacy and security issues in each phase …. From there appropriate privacy protecting and security techniques are applied to address these issues. Special mention is …
Persistent link: https://www.econbiz.de/10009434972
Preserving Privacy and the protection of personally identifiable information (PII) have been of increasing interest over the last few years. Many privacy advocates, and a significant portion of the general public, feared that the new initiatives used in an attempt to fight terrorism, would have...
Persistent link: https://www.econbiz.de/10009434973