Sciweavers

ICSOC
2009
Springer
13 years 2 months ago
Using Personal Information Management Infrastructures to Facilitate User-Generated Services for Personal Use
Ad-hoc and situational applications for personal use will gain more and more traction in the work support for knowledge workers (KWers). Personal information is a key element in th...
Olaf Grebner
TRUSTBUS
2010
Springer
13 years 3 months ago
Privacy Policy Referencing
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Audun Jøsang, Lothar Fritsch, Tobias Mahler
CIKM
2010
Springer
13 years 3 months ago
Building a semantic representation for personal information
A typical collection of personal information contains many documents and mentions many concepts (e.g., person names, events, etc.). In this environment, associative browsing betwe...
Jinyoung Kim, Anton Bakalov, David A. Smith, W. Br...
JCP
2007
121views more  JCP 2007»
13 years 4 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
JUCS
2006
102views more  JUCS 2006»
13 years 4 months ago
A Mechanism for Solving Conflicts in Ambient Intelligent Environments
: Ambient Intelligence scenarios describe situations in which multitude of devices and agents live together. In this kind ofscenarios is frequent to see the appearance ofconflicts ...
Pablo A. Haya, Germán Montoro, Abraham Esqu...
EOR
2008
80views more  EOR 2008»
13 years 5 months ago
Privacy and pricing personal information
The issues we address here are
Jeevan Jaisingh, Jack Barron, Shailendra Mehta, Al...
FIS
2010
13 years 5 months ago
A Provenance-Based Compliance Framework
Given the significant amount of personal information available on the Web, verifying its correct use emerges as an important issue. When personal information is published, it shoul...
Rocío Aldeco-Pérez, Luc Moreau
ICIS
1993
13 years 6 months ago
Markets and Privacy
In this paper we experimentally compare the welfare efficiency of ‘information markets’ – markets where consumer information can be traded, to markets where no trade in info...
Kenneth C. Laudon
PST
2004
13 years 6 months ago
The Sensitivities of User Profile Information in Music Recommender Systems
Personalized services can cause privacy concerns, due to the acquisition, storage and application of sensitive personal information. This paper describes empirical research into th...
Evelien van de Garde-Perik, Boris E. R. de Ruyter,...
IADIS
2003
13 years 6 months ago
Personal Information Transfer From a Mobile Device to Web Page
This paper presents a plug-in for Mozilla web browser that fetches personal information from a mobile device. Its purpose is to facilitate the repetitive entry of personal informa...
Mika Yrjölä, Pekka Jäppinen, Jari P...