The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Educational data contains valuable information that can be harvested through learning analytics to provide new insights for a better education system. However, sharing or analysis of this data introduce privacy risks for the data subjects, mostly students. Existing work in the learning analytics literature identifies the need for privacy and pose interesting research directions, but fails to apply...
In this paper, we describe different ways that data collected through gaming can be used to learn more about individual players or their groups. We also make a case, taking into consideration two massively multiplayer online games, that such data may be indiscriminately collected, given the diminishing cost of electronic storage space and the increasing need for information that government and other...
The growing intelligence and popularity of smartphones and the advances in Mobile Ubiquitous Computing have resulted in rapid proliferation of data-sharing applications. Instances of these applications include pervasive social networking, games, file sharing and so on. In such scenarios, users are usually involved in selecting the peers with whom communication should take place, continuously facing...
Data mining is gaining societal momentum due to the ever increasing availability of large amounts of human data, easily collected by a variety of sensing technologies. Data mining comes with unprecedented opportunities and risks: a deeper understanding of human behavior and how our society works is darkened by a greater chance of privacy intrusion and unfair discrimination based on the extracted patterns...
Positive emotions have been proven to be a key factor for successful learning. In modern personalized learning environments informal learning takes a prominent role and with this the use of computer-mediated communication. Communication data, like for example chat logs, can be harvested for sentiments. Most sentiment analyses operate processing only verbal information. But the messages exchanged in...
In the future, pervasive computing technologies will leverage new ubiquitous and intelligent user-oriented services. In this sense, by combining social network analysis, reality mining techniques and context-aware systems, our work provides an architecture and ground steps for understanding and predicting human behavior and preferences within one of the most promising business models of the future:...
Telecommunication and Internet services are constantly subject to changes, seeking the customers full satisfaction. Enriching these services with innovative approaches such as context-aware, social, mobile, adaptable and interactive mechanisms, enables users to experience a variety of personalized services seamlessly across different platforms and technologies. In this sense, it is expected that next...
Personal Identifiable Information (PII) describes a relationship between information and a uniquely identifiable person. Sensitive PII refers to a category of PII that contains significant information about individuals. In general, sources of sensitivity of PII can be tracked by partitioning the basic unit of linguistic information into three parts: identity, verb, and the reminder of the linguistic...
As a technology to improve safety, efficiency and convenience in transportation, vehicular ad hoc networks(VANETs) attract more and more attentions of researchers. VANETs will achieve a series of applications by periodically broadcasting beacons containing vehicular status information such as position, velocity and direction. However, some attackers might also utilize the information to track users'...
Dissemination control is concerned with controlling electronic resources even after they have been delivered to a legitimate recipient. This paper proposes a secure resource dissemination system framework in which resource providers and recipients are interacted mutually in an anonymous, accountable, and trustworthy way, while security constraints on diverse resources can be continuously protected...
A personal network (PN) is a network of geographically distributed personal devices, which creates a distributed environment of a user and provides access to personal resources and services regardless the location of the user. A federation of personal networks (Fednet) is a peer-to-peer cooperation of PNs of different users to share personal resources and services. Until now little research has been...
Our goal is to use the vast repositories of available open source code to generate specific functions or classes that meet a user's specifications. The key words here are specifications and generate. We let users specify what they are looking for as precisely as possible using keywords, class or method signatures, test cases, contracts, and security constraints using a simple, Web-based interface...
Privacy in ubiquitous computing is often discussed on a technical level with a focus on cryptography and anonymization. On the other side it is equally important to concentrate on user side aspects of privacy control, i.e., to enable users of ubicomp applications to practice privacy dynamically and in an intuitive way. In our work we review previous approaches on user side management of private information...
Reputation is a well established means to determine trustworthiness in online systems in various contexts, e.g. online transactions, product recommendation, e-mail spam fighting, etc. However, typically these reputation systems are "closed'' outside of the community: the set of participants, their possible actions, their evaluation and the mechanism to derive trust evaluations are predetermined...
Privacy is important in health care delivery. Effective and efficient health care delivery is about exploiting information - accurate information, complete information. Without privacy, patient trust is diminished, information flow may be compromised and, so too, patient care. When patient care is compromised, inefficiencies emerge and there are verifiable costs to the individual, to the provider...
This paper contributes to the evolving body of knowledge pertaining to the study of digitally-enabled social networks, their usage, and their effects on people, organization, and society. We review the literature on social networks and develop a typology which distinguishes four aspects of digital social networks usage: (i) building and sustaining the network, (ii) observing the network, (iii), extracting...
There are various critical privacy issues that need to be addressed in the majority of smart space environments. This paper elaborates on the design of a privacy protection framework for personal self-improving smart spaces (PSSs), a concept introduced by the persist project consortium. Compared to other smart spaces, such as smart homes and vehicles, this new paradigm provides a truly ubiquitous...
As Internet access moves away from desktop platforms to increasingly mobile, handheld, ubiquitous computing tools, questions arise regarding the impact physical surroundings have on online self-disclosure. Considering that popular Web2.0 applications like Weblogs are characterized by broad and often intimate disclosures of personal information, we test the relationship between a range of environmental...
Social Network Sites have a number of well publicized privacy issues stemming from the over disclosure of personal information. On one hand, users seem oblivious to their privacy, doing little to protect their personal data. On the other hand, there have been a number of privacy uproars and backlashes due to certain site features or behaviors. In this paper, we explore the privacy issues in social...
Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always been vulnerable to numerous privacy threats. The more we aim at safe usage of location based services, the more we feel the necessity of a secure location privacy system. Most of the existing systems adopt the mechanism of satisfying...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.