Showing 1 - 10 of 56
This article describes how building up on the foundation of knowledge created by the previous scholars is the base of any scholarly communication. Usually scholars also willing to share their findings to others to gain guidance, approval and recognition. The user should use the shared...
Persistent link: https://www.econbiz.de/10012046381
privacy and security, suffer from one or more anomalies, and hence the problem of securing LBS data is far from being resolved …. In particular, accuracy of results vs. privacy degree, privacy vs. performance, and trust between users are open problems … superiority of our approach over earlier ones dealing with both the ratio of privacy and that of performance. …
Persistent link: https://www.econbiz.de/10012042666
healthcare organisations. But hosting healthcare solutions on cloud is challenging in terms of security and privacy of health … data. To address these challenges and to provide security and privacy to health data on the cloud, the authors present a … Software-as-a-Service (SaaS) application with a data model with built-in security and privacy. This data model enhances …
Persistent link: https://www.econbiz.de/10012043357
The integration of cloud computing with mobile computing and internet has given birth to mobile cloud computing. This technology offers many advantages to users, like Storage capacity, Reliability, Scalability and Real time data availability. Therefore, it is s increasing fast and it is...
Persistent link: https://www.econbiz.de/10012043374
The paper discusses the use of RFID technologies in healthcare setting examining the status of applications and prospective views. The authors have identified two classes of applications of RFID technologies in healthcare setting: people monitoring/management and items/assets management...
Persistent link: https://www.econbiz.de/10012043547
This article describes how a new budding method opens up the avenue for debate to generate ideas and thoughts around its ethical grounding, especially with its application on children. This purpose should be addressed to ensure a pluralistic ethical approach to dealing with children as...
Persistent link: https://www.econbiz.de/10012043781
through a human-centric perspective. Freedom of expression and the right to privacy are under attack in the era of cyber …
Persistent link: https://www.econbiz.de/10012043867
Worthwhileness of Searching, Privacy, Information Trust, and Security before adopting web-based PHR. By using HINTS (Health … patients to adopt web-based PHR. Privacy, Information Trust, and Security are also enablers to adopt web-based PHR. But … privacy and security. …
Persistent link: https://www.econbiz.de/10012044253
Cloud computing, at its most fundamental level, is a technology that allows computing to occur as an on-demand utility. Personalized medicine is revolutionizing the field of medicine, and aims to provide individualized treatment for patients, based on their genetic material and medical history,...
Persistent link: https://www.econbiz.de/10012044433
It is increasingly common for municipal police services in North America to make online crime maps available to the public. This form of civic technology is now so widely used that there is a competitive private sector market for crime mapping platforms. This paper considers the crime maps made...
Persistent link: https://www.econbiz.de/10012044641