Results 1 - 10
of
46,202
Data Security
, 1979
"... The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and ..."
Abstract
-
Cited by 615 (3 self)
- Add to MetaCart
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system
PERSONAL DATA
, 1971
"... 2 WORK EXPERIENCE Professor (personal full professorship) at Wageningen University, in the Department of ..."
Abstract
- Add to MetaCart
2 WORK EXPERIENCE Professor (personal full professorship) at Wageningen University, in the Department of
k-anonymity: a model for protecting privacy.
- International Journal on Uncertainty, Fuzziness and Knowledge-based Systems,
, 2002
"... Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific guarantees ..."
Abstract
-
Cited by 1313 (15 self)
- Add to MetaCart
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific
Personal Data
, 2006
"... Thesis: Evaluation of neural learning in a MLP NN for an acoustic-to-articulatory ..."
Abstract
- Add to MetaCart
Thesis: Evaluation of neural learning in a MLP NN for an acoustic-to-articulatory
Personal Data
"... Google is an equal opportunity, affirmative action employer. Qualified applicants are considered without regard to race, color, religion, veteran status, ..."
Abstract
- Add to MetaCart
Google is an equal opportunity, affirmative action employer. Qualified applicants are considered without regard to race, color, religion, veteran status,
Personal Data
"... Fellowship Type This application is being made for a fellowship in (please check one): Blood banking/Transfusion medicine Breast pathology ..."
Abstract
- Add to MetaCart
Fellowship Type This application is being made for a fellowship in (please check one): Blood banking/Transfusion medicine Breast pathology
Email overload: exploring personal information management of email
- CHI 96 CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS
, 1996
"... Email is one of the most successful computer applications yet devised. Our empirical data show however, that although email was origirally designed as a communications application, it is now used for additional functions, that it was not designed for, such as task management and personal archiving. ..."
Abstract
-
Cited by 450 (28 self)
- Add to MetaCart
Email is one of the most successful computer applications yet devised. Our empirical data show however, that although email was origirally designed as a communications application, it is now used for additional functions, that it was not designed for, such as task management and personal archiving
Consumers and Their Brands: Developing Relationship Theory
- Journal of consumer research
, 1998
"... Although the relationship metaphor dominates contemporary marketing thought and practice, surprisingly little empirical work has been conducted on relational phenomena in the consumer products domain, particularly at the level of the brand. In this article, the author: (1) argues for the validity of ..."
Abstract
-
Cited by 552 (3 self)
- Add to MetaCart
of relationships consumers form with brands; and (3) inducts from the data the concept of brand relationship quality, a diagnostic tool for conceptualizing and evaluating relation-ship strength. Three in-depth case studies inform this agenda, their interpretation guided by an integrative review of the literature
MACAW: A Media Access Protocol for Wireless LAN's
"... In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols f ..."
Abstract
-
Cited by 839 (11 self)
- Add to MetaCart
In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols
Results 1 - 10
of
46,202