Search

Your search keyword '"Information sensitivity"' showing total 6,645 results

Search Constraints

Start Over You searched for: Descriptor "Information sensitivity" Remove constraint Descriptor: "Information sensitivity"
6,645 results on '"Information sensitivity"'

Search Results

1. Disclosing Personal Health Information to Emotional Human Doctors or Unemotional AI Doctors? Experimental Evidence Based on Privacy Calculus Theory.

2. Chatbots or Humans? Effects of Agent Identity and Information Sensitivity on Users' Privacy Management and Behavioral Intentions: A Comparative Experimental Study between China and the United States.

3. Narrative triggers of information sensitivity.

4. Optimization of water quality evaluation index using information sensitivity method and variable fuzzy model for the Guo River, China.

5. The Effect of Information Sensitivity and Usage on Consumer Privacy: The Case of Electronic Payment Systems

7. A Review of Privacy Decision-making Mechanisms in Online Social Networks.

8. 基于信息敏感性与 CSA-BP 神经网络的 “智慧工地系统”实施风险评价研究.

9. Managing Information Sensitivity: The Relationship between the Interbank Offered Rate and the Characteristics of Bank-Issued Wealth Management Products in China.

10. Parents' perceptions of the sensitivity of their children's personal information and willingness to share with social media marketers: Implications for sharenting.

11. HOW STUDENTS' INFORMATION SENSITIVITY, PRIVACY TRADE-OFFS, AND STAGES OF CUSTOMER JOURNEY AFFECT CONSENT TO UTILIZE PERSONAL DATA.

12. Detection and nudge-intervention on sensitive information in social networks.

13. Automatic Detection of Sensitive Information in Educative Social Networks

14. The Workplace Information Sensitivity Appraisal (WISA) scale

16. An Investigation Into the Sensitivity of Personal Information and Implications for Disclosure: A UK Perspective

17. Should I Disclose My Personal Data? Perspectives From Internet of Things Services

18. Adverse Selection Dynamics in Privately-Produced Safe Debt Markets.

19. The modest effects of fact boxes on cancer screening.

20. Effects of two channels on explosive information spreading.

21. Verifiable Multikeyword Search Encryption Scheme With Anonymous Key Generation for Medical Internet of Things

22. Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing

23. Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression

24. Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment

25. Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data

26. PIN Inference Attack: A Threat to Mobile Security and Smartphone-Controlled Robots

27. Horizontal Federated Learning of Takagi–Sugeno Fuzzy Rule-Based Models

28. RPPTD: Robust Privacy-Preserving Truth Discovery Scheme

29. Efficient Privacy-Preserving Similarity Range Query With Quadsector Tree in eHealthcare

30. WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave

31. A Secure Data Aggregation Strategy in Edge Computing and Blockchain-Empowered Internet of Things

32. Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System

33. Blockchain in Big Data Security for Intelligent Transportation With 6G

34. Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks

35. Achieving Efficient and Privacy-Preserving Dynamic Skyline Query in Online Medical Diagnosis

36. CPFinder: Finding an unknown caller's profession from anonymized mobile phone data

37. Understanding users' willingness to put their personal information on the personal cloud-based storage applications: An empirical study.

38. VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT

39. Differentially Private Distributed Nash Equilibrium Seeking for Aggregative Games

40. RTT-Based Rogue UAV Detection in IoV Networks

41. Optimizing Task Location Privacy in Mobile Crowdsensing Systems

42. PrivStream: A privacy-preserving inference framework on IoT streaming data at the edge

43. A Privacy-Preserving Storage Scheme for Logistics Data With Assistance of Blockchain

44. Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data

45. <scp>Desire</scp> : Leveraging the Best of Centralized and Decentralized Contact Tracing Systems

46. A Secure Clinical Diagnosis With Privacy-Preserving Multiclass Support Vector Machine in Clouds

47. CVSS: Ubiquitous and Broken

48. OPTDP: Towards optimal personalized trajectory differential privacy for trajectory data publishing

49. NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users

50. Accurate and Privacy-Preserving Task Allocation for Edge Computing Assisted Mobile Crowdsensing

Catalog

Books, media, physical & digital resources