Results for 'Web privacy services'

1000+ found
Order:
  1.  26
    Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment.Yanwei Xu, Lianyong Qi, Wanchun Dou & Jiguo Yu - 2017 - Complexity:1-9.
    With the increasing volume of web services in the cloud environment, Collaborative Filtering- based service recommendation has become one of the most effective techniques to alleviate the heavy burden on the service selection decisions of a target user. However, the service recommendation bases, that is, historical service usage data, are often distributed in different cloud platforms. Two challenges are present in such a cross-cloud service recommendation scenario. First, a cloud platform is often not willing to share its data to (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  2.  42
    Layering privacy on operating systems, social networks, and other platforms by design.Dawn N. Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
    Pervasive, easy-to-use privacy services are keys to enabling users to maintain control of their private data in the online environment. This paper proposes (1) an online privacy lifecycle from the user perspective that drives and categorizes the development of these services, (2) a layered platform design solution for online privacy, (3) the evolution of the PeCAN (Personal Context Agent Networking) architecture to a platform for pervasively providing multiple contexts for user privacy preferences and online (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Ethical issues in web data mining.Lita van Wel & Lambèr Royakkers - 2004 - Ethics and Information Technology 6 (2):129-140.
    Web mining refers to the whole of data miningand related techniques that are used toautomatically discover and extract informationfrom web documents and services. When used in abusiness context and applied to some type ofpersonal data, it helps companies to builddetailed customer profiles, and gain marketingintelligence. Web mining does, however, pose athreat to some important ethical values likeprivacy and individuality. Web mining makes itdifficult for an individual to autonomouslycontrol the unveiling and dissemination of dataabout his/her private life. To study thesethreats, (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  4.  34
    Patron Privacy in the "2.0" Era.Michael Zimmer - 2013 - Journal of Information Ethics 22 (1):44-59.
    As libraries begin to embrace Web 2.0 technologies to serve patrons—ushering in the era of Library 2.0—unique dilemmas arise in the realm of information ethics, especially regarding patron privacy. The norms of Web 2.0 promote the open sharing of information—often personal information—and the design of many Library 2.0 services capitalize on access to patron information and might require additional tracking, collection, and aggregation of patron activities. Thus, embracing Library 2.0 potentially threatens the traditional ethics of librarianship, where protecting (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  57
    Social web and identity: a likely encounter. [REVIEW]Thierry Nabeth - 2009 - Identity in the Information Society 2 (1):1-5.
    The Web 2.0, with online social technologies such as social networking services, blogs, wikis, or microbloging, has brought the vision of the Internet as a social landscape in which people are engaged in a multitude of social activities. This editorial of the special issue ‘Social Web and Identity’ discusses the importance of identity in the context of the Social Web, introducing the different papers of this special issue and the different aspects associated to these online identities. The topics covered (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  55
    ISPs & Rowdy Web Sites Before the Law: Should We Change Today’s Safe Harbour Clauses?Ugo Pagallo - 2011 - Philosophy and Technology 24 (4):419-436.
    The paper examines today’s debate on the new responsibilities of Internet service providers in connection with legal problems concerning jurisdiction, data processing, people’s privacy and education. The focus is foremost on the default rules and safe harbour clauses for ISPs liability, set up by the US and European legal systems. This framework is deepened in light of the different functions of the services provided on the Internet so as to highlight multiple levels of control over information and, correspondingly, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  7.  66
    The Impact of Web 2.0 on the Doctor-Patient Relationship.Bernard Lo & Lindsay Parham - 2010 - Journal of Law, Medicine and Ethics 38 (1):17-26.
    Web 2.0 innovations may enhance informed patient decision-making, but also raise ethical concerns about inaccurate or misleading information, damage to the doctor-patient relationship, privacy and confidentiality, and health disparities. To increase the benefits and decrease the risks of these innovations, we recommend steps to help patients assess the quality of health information on the Internet; promote constructive doctor-patient communication about new information technologies; and set standards for privacy and data security in patient-controlled health records and for point-of-service advertising.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  8. The debate on the moral responsibilities of online service providers.Mariarosaria Taddeo & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (6):1575-1603.
    Online service providers —such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract, we first analyse the moral responsibilities (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  9.  9
    Adopting social media as an information system – a case study of an internet service company in Abuja, Nigeria.Otobong Inieke & Babatunde Mustapha Raimi-Lawal - 2021 - Journal of Information, Communication and Ethics in Society 19 (1):163-179.
    Purpose In considering the ubiquity of information systems and the increasingly important role served in modern business and service delivery, social media if properly leveraged gives potential competitive advantage to a company in its respective industry. With Paramount Web Nigeria Ltd. as a case study, this paper aims to focus on the important aspects of adopting social media as an IS such as data privacy principles and the role of social media in the context of a small internet service (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  97
    Privacy and artificial agents, or, is google reading my email?Samir Chopra & Laurence White - manuscript
    in Proceedings of the International Joint Conference on Artificial Intelligence, 2007.
    Direct download  
     
    Export citation  
     
    Bookmark  
  11. The Digital Dictionary of Buddhism [DDB]: A Model for the Sustainable Development of a Collaborative, Field-wide Web Reference Service.A. Charles Muller - unknown
    The Digital Dictionary of Buddhism [DDB] (http://buddhism-dict.net/ddb), now on the Web for more than 15 years, has become a primary reference work for the field of Buddhist Studies. Containing over 53,000 entries, it is subscribed to by more than 30 university libraries (http://www.buddhism-dict.net/ddb/subscribing_libraries.html), and supported by the contributions of over 70 specialists, many of these recognized leaders in the field. It can perhaps be described as example of the type of web resource that has reached a degree of status and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12. Accountable privacy supporting services.Jan Camenisch, Thomas Groß & Thomas Scott Heydt-Benjamin - 2009 - Identity in the Information Society 2 (3):241-267.
    As privacy concerns among consumers rise, service providers increasingly want to provide services that support privacy enhancing technologies. At the same time, online service providers must be able to protect themselves against misbehaving users. For instance, users that do not pay their bill must be held accountable for their behavior. This tension between privacy and accountability is fundamental, however a tradeoff is not always required. In this article we propose the concept of a time capsule, that (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  13. Privacy best practices for direct-to-consumer genetic testing services : are industry efforts at self-regulation sufficient?James W. Hazel - 2021 - In I. Glenn Cohen, Nita A. Farahany, Henry T. Greely & Carmel Shachar (eds.), Consumer genetic technologies: ethical and legal considerations. New York, NY: Cambridge University Press.
     
    Export citation  
     
    Bookmark  
  14. Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
    Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded. Traffic data subsume under the notion of data protection and are central in the discussion. The telecommunications environment is profoundly changing. The traditionally closed markets with closed networks change into an open market with open networks. Within these open networks more privacy sensitive data are generated (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Quantifying privacy in terms of entropy for context aware services.Athanasios S. Voulodimos & Charalampos Z. Patrikakis - 2009 - Identity in the Information Society 2 (2):155-169.
    In this paper, we address the issue of privacy protection in context aware services, through the use of entropy as a means of measuring the capability of locating a user’s whereabouts and identifying personal selections. We present a framework for calculating levels of abstraction in location and personal preferences reporting in queries to a context aware services server. Finally, we propose a methodology for determining the levels of abstraction in location and preferences that should be applied in (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service.Huijuan Lian, Weidong Qiu, Zheng di YanHuang & Jie Guo - 2017 - Complexity:1-14.
    With the development of mobile communication technology, location-based services are booming prosperously. Meanwhile privacy protection has become the main obstacle for the further development of LBS. The k-nearest neighbor search is one of the most common types of LBS. In this paper, we propose an efficient private circular query protocol with high accuracy rate and low computation and communication cost. We adopt the Moore curve to convert two-dimensional spatial data into one-dimensional sequence and encrypt the points of interest (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  39
    Privacy and property issues for a familial cancer service.Graeme Suthers - 2008 - Journal of Bioethical Inquiry 5 (1):33-37.
    Approximately 1 in 30 people develop cancer due to an underlying familial predisposition. Genetic counselling and testing for people with (and at risk of) familial cancer are becoming more widely available, but service providers need to address challenging issues in relation to privacy and property. As in any counselling situation, a genetic counsellor seeks to ensure that the principles of autonomy, confidentiality, beneficence, and equity operate in favour of the client. But in dealing with a familial disorder, the application (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18.  31
    Understanding Privacy in Occupational Health Services.Anne Heikkinen, Gustav Wickström & Helena Leino-Kilpi - 2006 - Nursing Ethics 13 (5):515-530.
    The aim of this study was to gain a deeper understanding of privacy in occupational health services. Data were collected through in-depth theme interviews with occupational health professionals (n=15), employees (n=15) and employers (n=14). Our findings indicate that privacy, in this context, is a complex and multilayered concept, and that companies as well as individual employees have their own core secrets. Co-operation between the three groups proved challenging: occupational health professionals have to consider carefully in which situations (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  33
    Privacy and occupational health services.A. Heikkinen - 2006 - Journal of Medical Ethics 32 (9):522-525.
    Privacy is a key ethical principle in occupational health services. Its importance is emphasised in several laws, in ethical codes of conduct as well as in the literature, yet there is only very limited empirical research on privacy in the occupational health context. Conceptual questions on privacy in the occupational health context are discussed. The baseline assumption is that, in this context, privacy cannot be approached and examined only from the employee’s vantage point but the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  52
    Group Privacy and Govemment Surveillance of Religious Services.Travis Dumsday - 2008 - The Monist 91 (1):170-186.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  16
    Individual privacy rights with respect to services such as Google Street View.James Thornton - 2010 - Acm Sigcas Computers and Society 40 (4):70-76.
    For a person to squeeze his fingers is legal. For a person to face towards another person is legal. For a person to sight down the barrel of a gun is legal. Yet, for that same person to do all three of these things at once is very illegal. Although Google Street View, or GSV for short, and similar services may be comprised of previously accepted functions---operation of an automobile, photography, internet publishing, mapmaking, advertising, etc.---the whole of a thing (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  22. Web service modeling ontology.Dumitru Roman, Uwe Keller, Holger Lausen, Jos de Bruijn, Rubén Lara, Michael Stollberg, Axel Polleres, Cristina Feier, Cristoph Bussler & Dieter Fensel - 2005 - Applied Ontology 1 (1):77-106.
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
  23.  4
    Privacy and Studying Services for Rape Victims.Thomas A. Shannon - 1980 - IRB: Ethics & Human Research 2 (6):8.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  51
    The Argument Web: an Online Ecosystem of Tools, Systems and Services for Argumentation.Mark Snaith, Alison Pease, John Lawrence, Barbara Konat, Mathilde Janier, Rory Duthie, Katarzyna Budzynska & Chris Reed - 2017 - Philosophy and Technology 30 (2):137-160.
    The Argument Web is maturing as both a platform built upon a synthesis of many contemporary theories of argumentation in philosophy and also as an ecosystem in which various applications and application components are contributed by different research groups around the world. It already hosts the largest publicly accessible corpora of argumentation and has the largest number of interoperable and cross compatible tools for the analysis, navigation and evaluation of arguments across a broad range of domains, languages and activity types. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  25. International Workshop on Web-Based Internet Computing for Science and Engineering (ICSE 2006)-Discovery of Web Services Applied to Scientific Computations Based on QOS.Han Cao, Daxin Liu & Rui Fu - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3842--919.
     
    Export citation  
     
    Bookmark  
  26.  4
    Adoption of mobile health services using the unified theory of acceptance and use of technology model: Self-efficacy and privacy concerns.Yizhi Liu, Xuan Lu, Gang Zhao, Chengjiang Li & Junyi Shi - 2022 - Frontiers in Psychology 13.
    Mobile health services have been widely used in medical services and health management through mobile devices and multiple channels, such as smartphones, wearable equipment, healthcare applications, and medical platforms. However, the number of the users who are currently receiving the mHealth services is small. In China, more than 70% of internet users have never used mHealth services. Such imbalanced situation could be attributed to users’ traditional concept of medical treatment, psychological factors and privacy concerns. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  11
    How a US Federal Privacy Law Covering Digital Health Services Can Put Autonomy Back into the Hands of the Patient.Jennifer Eunbee Jin - 2023 - American Journal of Bioethics 23 (11):45-47.
    McCoy et al. introduces the novel Ethical Data Practices Framework and its six core principles to serve as a useful tool to inform both industry and lawmakers of key ethical principles for prospect...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  43
    Physicians' Ethics Forum: a web-based ethics consultation service.Pekka Louhiala, Samuli Saarni, Katri Hietala & Amos Pasternack - 2012 - Journal of Medical Ethics 38 (2):83-86.
    To meet all physicians' needs for ethics consultation in Finland, a novel form of service, the Physicians' Ethics Forum, was founded in 2003. The Forum is a cost-efficient service based on electronic communication. In this paper, experiences throughout its first 6 years are described.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  15
    Automated composition of Web services via planning in asynchronous domains.Piergiorgio Bertoli, Marco Pistore & Paolo Traverso - 2010 - Artificial Intelligence 174 (3-4):316-361.
  30.  76
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31. International Workshop on Web-Based Internet Computing for Science and Engineering (ICSE 2006)-Component Composition Based on Web Service and Software Architecture.Xin Wang, Changsong Sun, Xiaojian Liu & Bo Xu - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 987-990.
     
    Export citation  
     
    Bookmark  
  32. Applications and Services-Integration of Ontologies and Semantic Annotations with Resource Description Framework in Eclipse-Based Platforms with Editing Features for Semantic Web.Rui G. Freire Pereira - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3961--902.
    No categories
     
    Export citation  
     
    Bookmark  
  33. Workshop on Web-Based Massive Data Processing-Session 1-Streaming Data-Modelling and Guaranteeing Quality of Service over Data Streams.Shanshan Gu Wu & Yanfei Yu Lv - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 13-24.
    No categories
     
    Export citation  
     
    Bookmark  
  34.  18
    Byzantium on the web: new technologies at the service of museums and educational institutions for the presentation of byzantine culture.Vicky Foskolou - 2008 - Byzantinische Zeitschrift 100 (2):629-636.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  29
    Distributed Testing System for Web Service Based on Crowdsourcing.Xiaolong Liu, Yun-Ju Hsieh, Riqing Chen & Shyan-Ming Yuan - 2018 - Complexity 2018:1-15.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  21
    Location-Aware Web Service Composition Based on the Mixture Rank of Web Services and Web Service Requests.Junwen Lu, Guanfeng Liu, Keshou Wu & Wenjiang Qin - 2019 - Complexity 2019:1-16.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Communications Systems and Networks-Web Service Based Inter-AS Connection Managements for QoS-Guaranteed DiffServ Provisioning.Young-Tak Kim & Hyun-Ho Shin - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3647--248.
  38.  52
    Togetherness and respect: ethical concerns of privacy in Global Web Societies.Gordana Dodig-Crnkovic & Virginia Horniak - 2006 - AI and Society 20 (3):372-383.
    Today’s computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated internet-based attacks are almost impossible to prevent. At the same time, information and communication technology, ICT offers the technical possibility of embedded privacy protection. Making technology legitimate by design is a part of the intentional design for democracy. This means incorporating options for socially acceptable behaviour in technical systems, and making the basic principles of privacy protection, rights and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  33
    Taking the byte out of cookies: privacy, consent, and the Web.Daniel Lin & Michael C. Loui - 1998 - Acm Sigcas Computers and Society 28 (2):39-51.
    We consider the privacy of personal information on the World Wide Web, emphasizing a concept of privacy as an aspect of social relationships between individuals. We make three contributions to understanding the right to privacy on the Web: we highlight the role of informed consent as an important consideration for privacy, we identify conditions under which the collection and centralization of personal information can be ethically justified, and we offer an interpretation of a "reasonable expectation of (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  32
    Patients' privacy and satisfaction in the emergency department: a descriptive analytical study.N. D. Nayeri & M. Aghajani - 2010 - Nursing Ethics 17 (2):167-177.
    Respecting privacy and patients’ satisfaction are amongst the main indicators of quality of care and one of the basic goals of health services. This study, carried out in 2007, aimed to investigate the extent to which patient privacy is observed and its correlation with patient satisfaction in three emergency departments of Tehran University of Medical Science, Iran. Questionnaire data were collected from a convenience sample of 360 patients admitted to emergency departments and analysed using SPSS software. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  41.  20
    Found Your DNA on the Web: Reconciling Privacy and Progress.Amy Gutmann & James W. Wagner - 2013 - Hastings Center Report 43 (3):15-18.
    An article by Melissa Gymrek and colleagues, published this January in Science, described how the researchers used surname inferences from commercial genealogy databases and Internet searches to deduce the identity of nearly fifty research participants whose supposedly private data were stored in large, publicly available datasets. This news comes just months after the Presidential Commission for the Study of Bioethical Issues published a report that expressed serious concerns about personal privacy and security in whole genome sequencing. The bioethics commission (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  8
    A roadmap towards improving managed security services from a privacy perspective.Nils Ulltveit-Moe - 2014 - Ethics and Information Technology 16 (3):227-240.
    This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  42
    Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
    Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by others. The basis of modern privacy laws and practices around the world, informational privacy has become a challenging concept to protect and promote in a world of ubiquitous and unlimited data sharing and storage among organizations. The paper advocates a “user-centric” approach to managing personal data online. However, user-centricity can be problematic when the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Privacy, the workplace and the internet.Seumas Miller & John Weckert - 2000 - Journal of Business Ethics 28 (3):255 - 265.
    This paper examines workplace surveillance and monitoring. It is argued that privacy is a moral right, and while such surveillance and monitoring can be justified in some circumstances, there is a presumption against the infringement of privacy. An account of privacy precedes consideration of various arguments frequently given for the surveillance and monitoring of employees, arguments which look at the benefits, or supposed benefits, to employees as well as to employers. The paper examines the general monitoring of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   25 citations  
  45.  47
    The 2010 Schubmehl-Prein Essay Competition: what should individual privacy rights be with respect to services such as street view?Kevin W. Bowyer - 2010 - Acm Sigcas Computers and Society 40 (4):54-54.
    The 2010 competition was the sixth year of the Schubmehl-Prein contest for the Best Essay on Social Impact of Computing. The topic for this year turned was one that turned out to be in the news even more than anticipated -- What Should Individual Privacy Rights Be With Respect To Services Such As "Street View? The topic was originally envisioned primarily as one that would lead students to consider the different concepts of privacy that various countries have (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  46. Privacy, Autonomy, and Personalised Targeting: rethinking how personal data is used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Privacy, autonomy and direct-to-consumer genetic testing: a response to Vayena.Kyle van Oosterum - 2022 - Journal of Medical Ethics 48 (10):774-775.
    In Vayena’s article, ‘direct-to-consumer (DTC) genomics on the scales of autonomy’, she claims that there may be a strong autonomy-based argument for permitting DTC genomic services. In this response, I point out how the diminishment of one’s genetic privacy can cause a relevant autonomy-related harm which must be balanced against the autonomy-related gains DTC services provide. By drawing on conceptual connections between privacy and the Razian conception of autonomy, I show that DTC genetic testing may decrease (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  48.  17
    セマンティック Web サービスマッチメーカーの公開実験に基づく評価.Hasegawa Tetsuo Kawamura Takahiro - 2005 - Transactions of the Japanese Society for Artificial Intelligence 20:426-436.
    Experiment with public deployment of the semantic service matchmaker to a UDDI registry for a year is described in this paper. UDDI is a standard registry for Web Services, but, its search functionality has been limited to a keyword search. Therefore, we propose an enhancement of UDDI, called Matchmaker, that supports semantic service capability discovery. Since September 2003, we have deployed the Matchmaker in one of four official UDDI registries operated by NTT-Communications. In this paper, we first introduce the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  38
    Semantic Web Regulatory Models: Why Ethics Matter.Pompeu Casanovas - 2015 - Philosophy and Technology 28 (1):33-55.
    The notion of validity fulfils a crucial role in legal theory. In the emerging Web 3.0, Semantic Web languages, legal ontologies, and normative multi-agent systems are designed to cover new regulatory needs. Conceptual models for complex regulatory systems shape the characteristic features of rules, norms, and principles in different ways. This article outlines one of such multilayered governance models, designed for the CAPER platform, and offers a definition of Semantic Web Regulatory Models . It distinguishes between normative-SWRM and institutional-SWRM. It (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  29
    Sharing private data through personalized search.Kei Karasawa - 2009 - Identity in the Information Society 2 (3):205-220.
    A method for sharing private data through personalized searches is described. This method enables users to retrieve access-controlled private data as well as publicly available data by submitting a single query to a conventional search engine. Seamless integration of the method into current search services through a prototype on the Mozilla Firefox web browser, without any changes to existing search functions, such as crawling, indexing, and matching, is also described. Evaluations showed that the additional storage requirement is only 10% (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000