scholarly journals Users’ Responses to Privacy Issues with the Connected Information Ecologies Created by Fitness Trackers

Author(s):  
Zablon Pingo ◽  
Bhuva Narayan
2022 ◽  
Vol 14 (1/2) ◽  
pp. 1
Author(s):  
Stylianos Monogios ◽  
Nicholas Kolokotronis ◽  
Konstantinos Limniotis ◽  
Kyriakos Magos ◽  
Stavros Shiaeles

Author(s):  
Duong Tran Duc ◽  
Pham Bao Son ◽  
Tan Hanh ◽  
Le Truong Thien

Demographic attributes of customers such as gender, age, etc. provide the important information for e-commerce service providers in marketing, personalization of web applications. However, the online customers often do not provide this kind of information due to the privacy issues and other reasons. In this paper, we proposed a method for predicting the gender of customers based on their catalog viewing data on e-commerce systems, such as the date and time of access, the products viewed, etc. The main idea is that we extract the features from catalog viewing information and employ the classification methods to predict the gender of the viewers. The experiments were conducted on the datasets provided by the PAKDD’15 Data Mining Competition and obtained the promising results with a simple feature design, especially with the Bayesian Network method along with other supporting techniques such as resampling, cost-sensitive learning, boosting etc.


Author(s):  
Tracy Spencer ◽  
Linnea Rademaker ◽  
Peter Williams ◽  
Cynthia Loubier

The authors discuss the use of online, asynchronous data collection in qualitative research. Online interviews can be a valuable way to increase access to marginalized participants, including those with time, distance, or privacy issues that prevent them from participating in face-to-face interviews. The resulting greater participant pool can increase the rigor and validity of research outcomes. The authors also address issues with conducting in-depth asynchronous interviews such as are needed in phenomenology. Advice from the field is provided for rigorous implementation of this data collection strategy. The authors include extensive excerpts from two studies using online, asynchronous data collection.


2000 ◽  
Vol 24 (2) ◽  
pp. 78 ◽  
Author(s):  
Robert R. Johnson

Author(s):  
Elizabeth A. Johnson ◽  
Jane M. Carrington

It is estimated 1 in 3 clinical trials utilize a wearable device to gather real-time participant data, including sleep habits, telemetry, and physical activity. While wearable technologies (including smart watches, USBs, and implantable devices) have been revolutionary in their ability to provide a higher precision and accuracy to data acquisition external to the research milieu, there is hesitancy among providers and participants alike given security concerns, perception of cyber-related threats, and meaning attributed to privacy issues. The purpose of this research is to define cyber-situational awareness (CSA) as it pertains to clinical trials, evaluate its current measurement, and describe best practices for research investigators and trial participants to enhance protections in the digital age. This paper reviews integrated elements of CSA within the process of informed consent when wearable devices are implemented for trial procedures. Evaluation of CSA as part of informed consent allows the research site to support the participant in knowledge gaps surrounding the technology while also providing feedback to the trial sponsor as to technology improvements to enhance usability and wearability of the device.


2021 ◽  
Vol 13 (2) ◽  
pp. 24
Author(s):  
Mohammed Amine Bouras ◽  
Qinghua Lu ◽  
Sahraoui Dhelim ◽  
Huansheng Ning

Identity management is a fundamental feature of Internet of Things (IoT) ecosystem, particularly for IoT data access control. However, most of the actual works adopt centralized approaches, which could lead to a single point of failure and privacy issues that are tied to the use of a trusted third parties. A consortium blockchain is an emerging technology that provides a neutral and trustable computation and storage platform that is suitable for building identity management solutions for IoT. This paper proposes a lightweight architecture and the associated protocols for consortium blockchain-based identity management to address privacy, security, and scalability issues in a centralized system for IoT. Besides, we implement a proof-of-concept prototype and evaluate our approach. We evaluate our work by measuring the latency and throughput of the transactions while using different query actions and payload sizes, and we compared it to other similar works. The results show that the approach is suitable for business adoption.


Sign in / Sign up

Export Citation Format

Share Document