Showing 1 - 10 of 644
Persistent link: https://www.econbiz.de/10011510369
Persistent link: https://www.econbiz.de/10012135424
Persistent link: https://www.econbiz.de/10014364626
Persistent link: https://www.econbiz.de/10014302481
(TAM) and added perceived security, perceived privacy and personal innovativeness, was tested by means of a Partial Least … Square (PLS) modelling approach. The findings indicate that perceived security, Perceived Usefulness (PU) and personal …
Persistent link: https://www.econbiz.de/10008755377
still possible for an adversary to reconstruct the original data using additional information thus resulting in privacy …, based on statistical decision theory, that assesses the relationship between the disclosed data and the resulting privacy … database. We assess the privacy risk by taking into account both the entity identification and the sensitivity of the disclosed …
Persistent link: https://www.econbiz.de/10009430800
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and … representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information … Information Privacy. It has evolved through the study and application for information privacy and its affects on the operation …
Persistent link: https://www.econbiz.de/10009434833
When considering information security and privacy issues most of the attention has previously focused on data … operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of … new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and …
Persistent link: https://www.econbiz.de/10009434918
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and … representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information … Information Privacy. It has evolved through the study and application for information privacy and its affects on the operation …
Persistent link: https://www.econbiz.de/10009434924
. The proposed scheme is based on the regular ElGamal signature. In addition, the fair privacy of the proxy signer is … maintained. That means, the privacy of the proxy signer is preserved; and the privacy can be revealed when it is necessary. …
Persistent link: https://www.econbiz.de/10009434970