UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

2 3 4 5 6
zadetkov: 174.964
31.
  • On Designing Satisfaction-R... On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for [Formula Omitted]-Anonymity Location Privacy
    Zhang, Yuan; Tong, Wei; Zhong, Sheng IEEE transactions on information forensics and security, 01/2016, Letnik: 11, Številka: 11
    Journal Article
    Recenzirano

    To protect individuals' location privacy, an important privacy protection technique that can be used is Formula Omitted-anonymity, which requires at least Formula Omitted users to participate in an ...
Celotno besedilo
32.
Celotno besedilo

PDF
33.
Celotno besedilo

PDF
34.
Celotno besedilo

PDF
35.
  • Data capitalism and the use... Data capitalism and the user: An exploration of privacy cynicism in Germany
    Lutz, Christoph; Hoffmann, Christian Pieter; Ranzini, Giulia New media & society, 07/2020, Letnik: 22, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Ever since empirical studies found only a weak, if any, relationship between privacy concerns and privacy behavior, scholars have struggled to explain the so-called privacy paradox. Today, a number ...
Celotno besedilo

PDF
36.
  • Location Privacy Protection... Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things
    Yin, Chunyong; Xi, Jinwen; Sun, Ruxia ... IEEE transactions on industrial informatics, 08/2018, Letnik: 14, Številka: 8
    Journal Article

    In the research of location privacy protection, the existing methods are mostly based on the traditional anonymization, fuzzy and cryptography technology, and little success in the big data ...
Celotno besedilo
37.
  • iPrivacy: Image Privacy Pro... iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning
    Yu, Jun; Zhang, Baopeng; Kuang, Zhengzhong ... IEEE transactions on information forensics and security 12, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    To achieve automatic recommendation of privacy settings for image sharing, a new tool called iPrivacy (image privacy) is developed for releasing the burden from users on setting the privacy ...
Celotno besedilo

PDF
38.
  • Blissfully ignorant: the ef... Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus
    Kehr, Flavius; Kowatsch, Tobias; Wentzel, Daniel ... Information systems journal (Oxford, England), November 2015, Letnik: 25, Številka: 6
    Journal Article
    Recenzirano

    Existing research on information privacy has mostly relied on the privacy calculus model, which views privacy‐related decision‐making as a rational process where individuals weigh the anticipated ...
Celotno besedilo

PDF
39.
Celotno besedilo

PDF
40.
  • The Secret History of Domes... The Secret History of Domesticity
    McKeon, Michael 2005, 2006-12-26, 20050101
    eBook

    Taking English culture as its representative sample, The Secret History of Domesticity asks how the modern notion of the public-private relation emerged in the seventeenth and eighteenth centuries. ...
Celotno besedilo
2 3 4 5 6
zadetkov: 174.964

Nalaganje filtrov