Privacy engineering

Results: 1416



#Item
491Internet privacy / Computing / Network performance / Computer network security / Internet / Data transmission / Proxy server / Paleoclimatology / Proxy / Computer networking

The University of Hong Kong Department of Electrical and Electronic Engineering Nomination of Proxy for Approving Application for Laboratory Access Right

Add to Reading List

Source URL: elink.eee.hku.hk

Language: English - Date: 2013-02-25 02:47:17
492Human–computer interaction / Privacy / Wireless / Radio / Microwave engineering / University of Peradeniya / Telecommunications engineering / Technology / Automatic identification and data capture / Radio-frequency identification

RANDIKA KOSWATTA AWARDED THE LAMPARD PRIZE FOR 2013 Randika attended the SMEEA dinner on 9th July 2014 to receive his award. David Morgan, a professor in the department for many years, presented the award. The citation r

Add to Reading List

Source URL: www.eng.monash.edu.au

Language: English - Date: 2014-07-10 22:52:28
493Ambient intelligence / Ubiquitous computing / Electronic submission / Education / Call for papers / Privacy / Academic conference / Ethics / Knowledge / Academia

The PETRA conference is a highly interdisciplinary conference that focuses on computational and engineering approaches to improve the quality of life and enhance human performance in a wide range of settings, in the work

Add to Reading List

Source URL: www.petrae.org

Language: English - Date: 2015-04-01 22:23:47
494Cross-platform software / Internet privacy / World Wide Web / Google Chrome / JavaScript / Device fingerprint / Web typography / Adobe Flash / Fingerprint / Software / Computing / Portable software

FPDetective: Dusting the Web for Fingerprinters Gunes Acar1 , Marc Juarez1,2 , Nick Nikiforakis3 , Claudia Diaz1 , Seda Gürses1,4 , Frank Piessens3 and Bart Preneel1 1 KU Leuven, Dept. of Electrical Engineering (ESAT),

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
495Design / Human–computer interaction / Computer networks / Internet privacy / Visual arts / Intranet / User interface design / Website / Systems engineering process / Technical communication / Usability / Technology

Introduction This briefing summarises the services that GUI Designers provides to support the design and implementation of successful Intranet sites.

Add to Reading List

Source URL: gui-designers.co.uk

Language: English - Date: 2003-05-16 09:55:16
496Telecommunications data retention / Technology / Electronic engineering / National security / Communications data / Voice over IP / Internet privacy / Internet service provider / Cloud computing / Privacy of telecommunications / Surveillance / Telecommunications

19 January 2015 Mr James Nelson Inquiry Secretary Parliamentary Joint Committee on Intelligence and Security PO Box 6021 Parliament House

Add to Reading List

Source URL: isoc-au.org.au

Language: English - Date: 2015-01-22 18:24:39
497Computing / Identity theft / Phishing / Malware / Internet privacy / Social networking service / Social engineering / Computer security / Zeus / Cybercrime / Computer crimes / Crime

Social Networking and Security Risks Victor Law Regional Director, VeriSign User Authentication Services Asia Pacific 1

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-08-31 06:18:36
498Human–computer interaction / Privacy / Wireless / Electronic engineering / Radio spectrum / Radio-frequency identification / Automatic identification and data capture / Technology

LC Paper No. CB[removed]) For information on 10 December[removed]Legislative Council Panel on

Add to Reading List

Source URL: www.legco.gov.hk

Language: English - Date: 2007-12-05 01:15:50
499Intranet / Extranet / Systems engineering process / Usability / Paper prototyping / Web portal / Intranet strategies / Intranet portal / Computer networks / Internet privacy / Computing

KMC_CanonCaseStudy_v2.2.fm

Add to Reading List

Source URL: www.steptwo.com.au

Language: English - Date: 2012-09-20 02:00:29
500Data security / Management / Human rights / Privacy / Project governance / Information privacy / Information security / IT risk / Systems engineering process / Ethics / Security / Computer security

ICO – Privacy Impact Assessment Handbook

Add to Reading List

Source URL: www.rogerclarke.com

Language: English - Date: 2013-03-23 06:27:07
UPDATE