Showing 91 - 100 of 1,492
This article proposes a mechanism to provide privacy to mined results by assuming that the data is distributed across … second objective is to incorporate privacy at each level of the clusters node: cluster head and the group controller level …
Persistent link: https://www.econbiz.de/10012047900
Social networking users are presented with a plethora of profile and privacy settings; most of which are left defaulted …. As a result, there is little understanding of the fields that make up the user profile, the privacy settings available to …
Persistent link: https://www.econbiz.de/10012047918
Massive Open Online Courses (MOOCs) are commonly hosted as web servers for learners worldwide to access education and learning materials at low cost. Many of the well-known MOOCs have adopted open source software and database technologies and frequently operate within cloud environments. It is...
Persistent link: https://www.econbiz.de/10012048077
aspect of trust is the protection of user's privacy. Protecting privacy is about complying with user's desires when it comes … realized. This implies that security and privacy issues are inherently intertwined and should be viewed synergistically. The … aim of this paper is to elevate modern practices for ensuring security and privacy during software systems analysis and …
Persistent link: https://www.econbiz.de/10012048083
relation to privacy, rights, and government surveillance. Aside from covering the above issue, this paper will also discuss the …
Persistent link: https://www.econbiz.de/10012048136
Thanks to recent technological advancements, social networking has seen unprecedented growth. Services such as Facebook, Twitter and LinkedIn have evolved from niche communities to active cyber-societies. In addition to an increase in the diffusion of social media, there has also been an...
Persistent link: https://www.econbiz.de/10012048158
Revenge pornography, or nonconsensual pornography as it is also known, is the distribution of intimate sexual images by disaffected and disgruntled individuals as a means of seeking vengeance against ex partners. It is highly destructive behaviour which can result in victims being humiliated and...
Persistent link: https://www.econbiz.de/10012048327
Currently, a range of criminal offences are perpetrated online. In addition to the commission of traditional offences, such as fraud, stalking, and domestic violence, new phenomena have emerged to warrant attention from the media, government, and communities. The phenomenon colloquially referred...
Persistent link: https://www.econbiz.de/10012048332
exploitation. Privacy preserving data mining aims to prevent the discovery of sensitive information. Information hiding systems … provide excellent privacy and confidentiality, where securing confidential communications in public channels can be achieved …
Persistent link: https://www.econbiz.de/10012048354
privacy problems in SNSs have appeared. Part of these problems is caused by insecure Graphical User Interfaces (GUIs … environments which protect the privacy and security of individuals while being highly user friendly. The authors proposed four …
Persistent link: https://www.econbiz.de/10012048462