• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1237
  • 167
  • 137
  • 109
  • 83
  • 70
  • 38
  • 38
  • 36
  • 20
  • 18
  • 12
  • 12
  • 12
  • 12
  • Tagged with
  • 2377
  • 641
  • 556
  • 520
  • 508
  • 352
  • 332
  • 308
  • 299
  • 234
  • 234
  • 218
  • 209
  • 199
  • 183
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

THE INFORMATION ERA THREATENS PRIVACY: A Comparative Study of Electronic Money’s Privacy Policies and Privacy Laws

LIU, GUANRU 27 September 2011 (has links)
This thesis consists of an analysis of electronic money (e-money), e-money’s privacy policies and relevant privacy laws. The value of information and the development of technology enhance the risk of privacy violations in the information era. Consumer privacy interests with respect to e-money are governed in part by the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada and by the European Union’s Data Protection Directive. The analysis is directed at whether the privacy policies of three kinds of e-money – Octopus Card, PayPal and MasterCard – comply with the spirit and letter of these laws. In light of technology change, the laws should be interpreted to apply broadly to protect privacy interests. Enhanced privacy protection may in fact lead to greater adoption of e-money by consumers. / Thesis (Master, Law) -- Queen's University, 2011-09-27 17:53:30.503
142

A Framework for the Protection of Privacy in an Electronic Health Environment

Gordon, Michelle 26 July 2010 (has links)
This paper argues that given the proliferation of electronic health records (EHRs) in the health care system, legislative reform must occur to address the inadequacies of Ontario’s current health privacy legislation in accommodating EHRs. A coherent framework for legislation is necessary to capture the important role that privacy plays in public perception when it comes to legislating and managing EHRs in Ontario and, in turn, serve as a tool for legislators to understand the definitions and values of privacy associated with EHRs and the privacy problems worthy of protection in an electronic health environment. The failure to properly address these problems may lead to privacy losses and loss of public confidence in EHR systems. In applying this framework to three legislative options, it is evident that Ontario should amend the Personal Health Information Protection Act, 2004 to better contemplate the privacy protections necessary in an electronic health environment.
143

A Framework for the Protection of Privacy in an Electronic Health Environment

Gordon, Michelle 26 July 2010 (has links)
This paper argues that given the proliferation of electronic health records (EHRs) in the health care system, legislative reform must occur to address the inadequacies of Ontario’s current health privacy legislation in accommodating EHRs. A coherent framework for legislation is necessary to capture the important role that privacy plays in public perception when it comes to legislating and managing EHRs in Ontario and, in turn, serve as a tool for legislators to understand the definitions and values of privacy associated with EHRs and the privacy problems worthy of protection in an electronic health environment. The failure to properly address these problems may lead to privacy losses and loss of public confidence in EHR systems. In applying this framework to three legislative options, it is evident that Ontario should amend the Personal Health Information Protection Act, 2004 to better contemplate the privacy protections necessary in an electronic health environment.
144

Towards Privacy Preserving of Forensic DNA Databases

Liu, Sanmin 2011 December 1900 (has links)
Protecting privacy of individuals is critical for forensic genetics. In a kinship/identity testing, related DNA profiles between user's query and the DNA database need to be extracted. However, unrelated profiles cannot be revealed to each other. The challenge is today's DNA database usually contains millions of DNA profiles, which is too big to perform privacy-preserving query with current cryptosystem directly. In this thesis, we propose a scalable system to support privacy-preserving query in DNA Database. A two-phase strategy is designed: the first is a Short Tandem Repeat index tree for quick fetching candidate profiles from disk. It groups loci of DNA profiles by matching probability, so as to reduce I/O cost required to find a particular profile. The second is an Elliptic Curve Cryptosystem based privacy-preserving matching engine, which performs match between candidates and user's sample. In particular, a privacy-preserving DNA profile matching algorithm is designed, which achieves O(n) computing time and communication cost. Experimental results show that our system performs well at query latency, query hit rate, and communication cost. For a database of one billion profiles, it takes 80 seconds to return results to the user.
145

Sambanden mellan flexibelt arbete, privatliv och stress

Mårtensson, Marianne, Berggren, Marie January 2014 (has links)
Flexibelt arbete blir ett alltmer vanligt sätt att arbeta. Tekniken gör det allt svårare att urskilja gränserna mellan privat- och arbetsliv. Därför blir det intressant att undersöka om flexibelt arbetet har någon relation till privatlivet samt om stress har något samband till flexibelt arbete och privatliv. En enkätstudie genomfördes på två organisationer, undersökningen innehöll 136 deltagare varav 78 kvinnor. Enkäten innehöll frågor om stress, privatliv och flexibelt arbete. Resultatet visar att kvinnor i åldrarna 35-46  arbetade mer flexibelt än andra kvinnor i studien. Männen i studien arbetade mest flexibelt i åldrarna 56-65 och de som var i åldrarna 35-46. Det flexibla arbetet hade en relation till privatlivet och det tenderade att finnas ett negativt samband mellan flexibelt arbetet och stress. En av slutsatserna för studien är att det bör vara upp till var och en att bestämma om flexibelt arbetet är något för dem.
146

Realistic, Efficient and Secure Geographic Routing in Vehicular Networks

Zhang, Lei 10 March 2015 (has links)
It is believed that the next few decades will witness the booming development of the Internet of Things (IoT). Vehicular network, as a significant component of IoT, has attracted lots of attention from both academia and industry in recent years. In the field of vehicular networks, Vehicular Ad hoc NETwork (VANET) is one of the hottest topics investigated. This dissertation focuses on VANET geocast, which is a special form of multicast in VANET. In geocast, messages are delivered to a group of destinations in the network identified by their geographic locations. Geocast has many promising applications, i.e., geographic messaging, geographic advertising and other location-based services. Two phases are usually considered in the geocast process: phase one, message delivery from the message source to the destination area by geographic routing; phase two, message broadcast within the destination area. This dissertation covers topics in the two phases of geocast in urban VANETs, where for phase one, a data-driven geographic routing scheme and a security and privacy preserving framework are presented; and for phase two, the networking connectivity is analyzed and studied. The contributions of this dissertation are three-fold. First, from a real-world data trace study, this dissertation studies the city taxi- cab mobility. It proposes a mobility-contact-aware geocast scheme (GeoMobCon)for metropolitan-scale urban VANETs. The proposed scheme employs the node mobility (two levels, i.e., macroscopic and microscopic mobilities) and contact history information. A buffer management scheme is also introduced to further improve the performance. Second, this dissertation investigates the connectivity of the message broadcast in urban scenarios. It models the message broadcast in urban VANETs as the directed connectivity problem on 2D square lattices and proposes an algorithm to derive the exact analytical solution. The approach is also applied to urban VANET scenarios, where both homogeneous and heterogeneous vehicle density cases are considered. Third, this work focuses on the security and privacy perspectives of the opportunistic routing, which is the main technique utilized by the proposed geographic routing scheme. It proposes a secure and privacy preserving framework for the general opportunistic-based routing. A comprehensive evaluation of the framework is also provided. In summary, this dissertation focuses on a few important aspects of the two phases of VANET geocast in urban scenarios. It shows that the vehicle mobility and contact information can be utilized to improve the geographic routing performance for large- scale VANET systems. Targeting at the opportunistic routing, a security and privacy preserving framework is proposed to preserve the confidentiality of the routing metric information for the privacy purpose, and it also helps to achieve the anonymous authentication and efficient key agreement for security purposes. On the other hand, the network connectivity for the message broadcast in urban scenarios is studied quantitatively with the proposed solution, which enables us to have a better understanding of the connectivity itself and its impact factors (e.g., bond probability and network scale). / Graduate
147

Relevance of the local people's socio-cultural values in the landscape development of recreational sea fronts of Saudi Arabia : the case of Dammam

Al-Abdullah, Mohammed Masoud January 1999 (has links)
In Saudi Arabia two massive and costly coastal land reclamations and developments were undertaken in the 1980s to define the borders of the expansion of two main coastal cities towards the sea. The first was started in the city of Jeddah on the Red Sea, and the second was started in the Dammam metropolitan area on the Arabian Gulf, to the west and the east of Saudi Arabia respectively. Two coastal roads were constructed on the shoreline of these two cities. ... Taking the case of the recreational sea front of the city of Dammam, and set against the background of the nature and history of recreational activity in Saudi Arabia, this study investigates the part played by the socio-cultural background of the local users of the sea front, and its effect on their picnicking behaviour there, in order to assist in providing appropriate information for landscape architects and other decision makers involved in the planning and design of outdoor leisure facilities in Saudi Arabia. ... The development of suitable recreational sea fronts, then, depends not only on the technical expertise of landscape architects, but also on a proper understanding of the role played by socio-cultural factors in the requirements of the users. Steps should be taken, both in the training of landscape architects and in the monitoring of plans for leisure areas, which will enable them to develop facilities which will be appropriate to the needs, aspirations, and values of their primary users, the local people. The potential for further study in this area exists. A quantitative approach could help establish more exact data about the preferences of local users of recreational facilities, and thus more precise criteria for their design. This would also help in site management. And the possibility exists for research into the impact of sea front developments on natural resources and ecology
148

The study of privacy and security in B2C e-commerce environment /

Lallmahamood, Muniruddeen. Unknown Date (has links)
While Business-to-Consumer (B2C) e-commerce has increased sales opportunities for the seller, it has also created new threats for potential customers, one of which is their privacy invasion. Personal information privacy is becoming a matter of increasing concern over the Internet. In this review, a description of privacy concerns is attempted and empirical studies in this area are reviewed. The descriptive review includes the antecedents of privacy and security concerns, and privacy assurances. A description of privacy and security concern perspectives and dimensions is also reported in the area of current e-commerce development and policies in Malaysia. The conclusion for the study suggests that privacy assurances, such as Web privacy policy, legislation, and Internet seal of approval will contribute to reduce these perceived threats. It also appears that online privacy concerns are still not solved if personal information is not secured when the above policies and regulations cannot enforce the principles of data privacy. This implies that online security is an important feature to protect and secure personal information. Thus, privacy and security concerns can be a major critical risk factor for the success of B2C e-commerce. No prior studies have yet addressed the issue of privacy concerns in Malaysia. This may therefore need further research to understand the current practices here. / Thesis (DBA(DoctorateofBusinessAdministration))--University of South Australia, 2005.
149

Zulässigkeit von Identitätsfeststellungen mittels biometrischer Systeme durch öffentliche Stellen /

Meuth, Lotte. January 2006 (has links) (PDF)
Univ., Diss.--Freiburg i.Br., 2005. / Literaturverz. S. [259] - 277.
150

Managing personal information policies in electronic banking

Fawzi, Riad Mostafa. January 2004 (has links) (PDF)
Thesis (Ph. D.)--University of London, 2004. / Title from title screen. Description based on contents viewed Apr. 21, 2005. Includes bibliographical references.

Page generated in 0.0197 seconds