Sciweavers

2454 search results - page 257 / 491
» Privacy in the Information and Communications Technologies
Sort
View
104
Voted
SCHULE
2001
Springer
15 years 6 months ago
Co-operative ICT-supported learning. A practical approach to design
Abstract: Education is changing, following changes in society. The focus is shifting from teaching towards learning. And Informatics, more particularly Information and Communicatio...
Tom J. van Weert
ISECS
2008
IEEE
15 years 8 months ago
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer befo...
Mina Deng, Bart Preneel
80
Voted
UIST
2004
ACM
15 years 7 months ago
Augmenting conversations using dual-purpose speech
In this paper, we explore the concept of dual–purpose speech: speech that is socially appropriate in the context of a human– to–human conversation which also provides meanin...
Kent Lyons, Christopher Skeels, Thad Starner, Corn...
DAWAK
2006
Springer
15 years 5 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
BCSHCI
2009
15 years 3 months ago
"A little silly and empty-headed": older adults' understandings of social networking sites
This study suggests reasons for the absence of a growing proportion of the population, the so-called baby boomers, from the otherwise highly popular social networking sites. We ex...
Vilma Lehtinen, Jaana Näsänen, Risto Sar...