Privacy engineering

Results: 1416



#Item
821Radio-frequency identification / Telecommunications engineering / Human–computer interaction / Privacy / Bluetooth / Technology / Wireless / Automatic identification and data capture

E-Inclusion in Europe Dr. Stephan Lechner Director Joint Research Centre The European Commission’s in-house science service Serving society, stimulating innovation, supporting

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-03-29 06:03:15
822Human rights / Internet privacy / Information privacy / Personally identifiable information / Ethics / Privacy / European Data Protection Supervisor

Internet Privacy Engineering Network (IPEN) Workshop 26 September 2014 Berlin State Parliament, Niederkirchnerstr. 5, 10111, Berlin-Mitte REGISTRATION FORM Name ............................................. First name .

Add to Reading List

Source URL: secure.edps.europa.eu

Language: English - Date: 2014-08-14 11:29:15
823Human–computer interaction / Electronic engineering / Privacy / Wireless / Clipped tag / Optical RFID / Radio-frequency identification / Automatic identification and data capture / Technology

RFID Tags Privacy Threats and Countermeasures Current Status Gianmarco Baldini, Jan Loeschner,

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-06-14 04:32:10
824Ubiquitous computing / Automatic identification and data capture / Privacy / Radio-frequency identification / Bluetooth / Technology / Wireless / Telecommunications engineering

Microsoft PowerPoint - FlyerIPSC sesamonet2.3Lo [EN - collaborazioni] v2[removed]ppt

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-04-29 08:29:53
825Environmental law / Industrial hygiene / Right to know / Safety engineering / Internet privacy / Confidentiality / Privacy / Health Insurance Portability and Accountability Act / Freedom of information legislation / Ethics / Privacy law / Health

UTAH STATE DEVELOPMENTAL CENTER Notice of Privacy Practices ~ This notice is effective April 14, 2003 ~ THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED, AND HOW YOU CAN GET ACCESS TO THI

Add to Reading List

Source URL: hspolicy.utah.gov

Language: English - Date: 2012-02-11 03:14:58
826Computer network security / Mobile computers / Internet privacy / Network architecture / Cisco Systems / Videotelephony / Bring your own device / Mobile device management / Wireless / Technology / Electronic engineering / Electronics

Solution Sheet: BYOD BRING YOUR OWN DEVICE OVER VIEW The Bring Your Own Device (BYOD) phenomenon has become one of the most profound

Add to Reading List

Source URL: www.highpoint.com

Language: English - Date: 2013-04-30 13:51:59
827Law / Privacy / Internet privacy / Identity theft / Risk / Ethics / Identity management / Social issues

Privacy Engineering Objectives and Risk Model - Discussion Deck Objective-Based Design for Improving Privacy in Information Systems Purpose and Scope

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-08-07 08:04:16
828Risk / Industrial hygiene / Environmental social science / Risk management / Safety engineering / Ergonomics / Musculoskeletal disorder / Occupational Safety and Health Administration / Safety / Occupational safety and health / Health

(Names have been removed in order to protect the privacy of the individuals submitting the complaint.) u.s. Department of Labor Occupational Safety and Health Administration Washington, D.C.20210

Add to Reading List

Source URL: www.dol.gov.

Language: English - Date: 2006-02-14 15:46:57
829Imaging / Digital photography / Crime prevention / National security / Privacy / Surveillance / Human–computer interaction / Rendering / Pixel / Computer vision / Image processing / Computer graphics

Seeing is for Humans, and Computers Tsuhan Chen ELECTRICAL AND COMPUTER ENGINEERING

Add to Reading List

Source URL: www.research.cornell.edu

Language: English - Date: 2014-07-31 14:41:17
830Business / Employment / Social engineering / Internet ethics / Email / Internet fraud / Job hunting / Internet privacy / Résumé / Internet / Spamming / Computing

How to be a Smart Job Seeker and Avoid Online Fraud With the number of people unemployed in the US at this time, many people are looking for jobs, and the competition can be steep. Online scam artists take advantage of t

Add to Reading List

Source URL: www.fresnostate.edu

Language: English - Date: 2012-10-12 19:05:54
UPDATE