• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1258
  • 168
  • 137
  • 109
  • 83
  • 70
  • 38
  • 38
  • 36
  • 21
  • 18
  • 12
  • 12
  • 12
  • 12
  • Tagged with
  • 2416
  • 656
  • 566
  • 527
  • 514
  • 353
  • 337
  • 309
  • 299
  • 240
  • 236
  • 221
  • 212
  • 199
  • 186
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
151

Zulässigkeit von Identitätsfeststellungen mittels biometrischer Systeme durch öffentliche Stellen /

Meuth, Lotte. January 2006 (has links) (PDF)
Univ., Diss.--Freiburg i.Br., 2005. / Literaturverz. S. [259] - 277.
152

Managing personal information policies in electronic banking

Fawzi, Riad Mostafa. January 2004 (has links) (PDF)
Thesis (Ph. D.)--University of London, 2004. / Title from title screen. Description based on contents viewed Apr. 21, 2005. Includes bibliographical references.
153

A study of country-level factors associated with governmental violations of the integrity of the body/security of the person

Steen, Julie Allison. Harrison, Dianne F. January 2003 (has links)
Thesis (Ph. D.)--Florida State University, 2003. / Advisor: Dr. Dianne F. Harrison, Florida State University, School of Social Work. Title and description from dissertation home page (viewed Sept. 08, 2004). Includes bibliographical references.
154

Die heimliehe Tonbandaufnahme und ihre prozessuale Verwertung im amerikanischen und deutschen Recht

Krier, Stephan Alexander, January 1973 (has links)
Inaug.-Diss.--Bonn. / Vita. Bibliography: p. 6-21.
155

Her body, his choice? comparing men's and women's claims to procreative privacy /

Lamboy, Lillian Michaela. January 2010 (has links)
Honors Project--Smith College, Northampton, Mass., 2010. / Includes bibliographical references (p. 99-106).
156

Regulation of private military companies in Iraq

Dumlupinar, Nihat. January 2010 (has links) (PDF)
Thesis (M.A. in Security Studies (Civil-Military Relations))--Naval Postgraduate School, March 2010. / Thesis Advisor(s): Bruneau, Thomas ; Ear, Sophal. "March 2010." Description based on title screen as viewed on April 26, 2010. Author(s) subject terms: Private military companies, Private security companies, Civil-military relations, Regulation of private military companies, Contractors. Includes bibliographical references (p. 93-100). Also available in print.
157

Liberal privacy and women a broken promise /

Theis, Adriane. January 2006 (has links)
Thesis (B.A.)--Haverford College, Dept. of Political Science, 2006. / Includes bibliographical references.
158

The relationship of values and norms an analysis of personal freedom in law /

Hession, Mark R. January 1986 (has links)
Thesis (J.C.L.)--Catholic University of America, 1986. / Includes bibliographical references (leaves 65-72).
159

Security and privacy in app ecosystems

Taylor, Vincent January 2017 (has links)
Smartphones are highly-capable mobile computing devices that have dramatically changed how people do business, interact with online services, and receive entertainment. Smartphone functionality is enhanced by an ecosystem of apps seemingly covering the entire gamut of functionality. While smartphone apps have undoubtedly provided immeasurable benefit to users, they also contribute their fair share of drawbacks, such as increases in security risks and the erosion of user privacy. In this thesis, I focus on the Android smartphone operating system, and pave the way for improving the security and privacy of its app ecosystem. Chapter 3 starts by doing a comprehensive study on how Android apps have evolved over a three-year period, both in terms of their dangerous permission usage and the vulnerabilities they contain. It uncovers a trend whereby apps are using increasing numbers of dangerous permissions over time and at the same time becoming increasingly vulnerable to attack by adversaries. By analysing the Google Play Store, Android's official app marketplace, Chapter 4 shows that many general-purpose apps can be replaced with functionallysimilar alternatives to the benefit of the user. This confirms that users still wield power to improve their own security and privacy. Chapter 5 combines this insight with real-world data from approximately 30,000 smartphones to understand the actual risk that the average user faces as a result of their use of apps, and takes an important first step in measuring the improvements that can be made. Users, however, are not always aware of the risks they face and thus Chapter 6 demonstrates the feasibility of a classification system that can transparently and unobtrusively identify and alert users to the presence of apps of concern on their devices. This classification system identifies apps from features in the network traffic they generate, without itself analysing the payload of their traffic, thus maintaining a high threshold of privacy. While the work presented in this thesis has uncovered undesirable trends in app evolution, and shows that a large fraction of users are exposed to non-trivial risk from the apps they use, in many cases there is suficient diversity in the offerings of general-purpose apps in the Google Play Store to empower users to mitigate the risks coming from the apps they use. This work takes us a step further in keeping users safe as they navigate and enjoy app ecosystems.
160

Privacy-preserving targeted advertising for mobile devices

Liu, Yang January 2017 (has links)
With the continued proliferation of mobile devices, the collection of information associated with such devices and their users - such as location, installed applications and cookies associated with built-in browsers - has become increasingly straightforward. By analysing such information, organisations are often able to deliver more relevant and better focused advertisements. Although such Targeted Mobile Advertising (TMA) offers great benefits to advertisers, it gives rise to a number of concerns, with privacy-related concerns being prominent amongst them. It follows that there is a need for an advertisement-selection mechanism that can support the existing TMA business model in a manner that takes into account consumers' privacy concerns. The research described in this dissertation explores the delicate balance between the goals of the advertisers and the consumers: advertisers pursue profits by applying TMA, which violates consumers' privacy; consumers hope to benefit from useful mobile advertisements without compromising their personal information. The conflicts of interests between consumers and advertisers in the context of targeted mobile advertising brings us to our research question: Is it possible to develop a privacy-preserving TMA framework that enables mobile users to take advantage of useful advertising services without their privacy being compromised, and without impacting significantly advertising effectiveness? In order to answer this question, this dissertation presents four main contributions. First, we report upon the result of a qualitative study to discuss the balance that needs to be struck between privacy and utility in this emerging area. Second, a number of formal models are developed to reason about privacy, as well as to reason about the relationship between privacy and utility in the context of TMA. Third, a novel ad-selection architecture, PPTMA (Privacy-Preserving Targeted Mobile Advertising), is presented and evaluated. Finally, a privacy-preserving advertisement-selection mechanism, AdSelector, is introduced. The mechanism is novel in its combination of a user subscription mechanism, a two-stage ad-selection process, and the application of a trustworthy billing system.

Page generated in 0.0361 seconds