757 resultados para profilazione,GDPR,privacy,informativa privacy,trattamento dati personali,dati personali


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Informative website about Anonymous/LulzSec and Denial of Service attacks

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Análisis desde una perspectiva ética del papel que cumplieron los medios impresos Semana, El Tiempo y El Espectador durante las masacres de El Salado y de Bojayá.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper introduces vulnerability and quantitative privacy. Optional reading

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Friendface is a Facebook-styled site aimed at illustrating the importance of using appropriate privacy settings when using social media

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Really, you don't say?" quiz show

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This resource is an informational resource that attempts to inform the general public about security and privacy with using the internet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Group 20 (km) "Kirk's Krew" is proud to present "Panorama: An Investigation into Augmented Reality," an exciting and entertaining video used for the general public which engages through a fast-paced investigatory style. You'll never forget the story of students Jake and Andrew as they seek to thwart the villianous schemes of Larry Beige with help and hindrance from AR! Explore the past, present and future of AR in a Panorama style investigation! ECS' very own Dr Enrico Costanza is on hand with years of expertise! For a full listing of share contents, please see readme.txt

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We know where you live is an entertaining and informative quiz show highlighting the dangers resulting from a lack of awareness of Facebook's privacy and security settings. The game show is complemented by a short tutorial explaining these settings. The show is aimed at a wider audience and is suitable for all.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Slides on presentations on the following topics: 1.1 Virtuality 1.2 New Business Models 1.3 Privacy and Personal Security see http://www.edshare.soton.ac.uk/10709/ for detailed briefs

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Slides on presentations on the following topics: 2.1 Privacy and Security Legal overview, 2.2 Creative Commons open source, open movements 2.3 Crime online, Cyber security 2.4 Freedom of Speech and Defamation

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Privacy

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wednesday 12th March 2014 Speaker(s): Dr Tim Chown Organiser: Time: 12/03/2014 11:00-11:50 Location: B32/3077 File size: 642 Mb Abstract The WAIS seminar series is designed to be a blend of classic seminars, research discussions, debates and tutorials. The Domain Name System (DNS) is a critical part of the Internet infrastructure. In this talk we begin by explaining the basic model of operation of the DNS, including how domain names are delegated and how a DNS resolver performs a DNS lookup. We then take a tour of DNS-related topics, including caching, poisoning, governance, the increasing misuse of the DNS in DDoS attacks, and the expansion of the DNS namespace to new top level domains and internationalised domain names. We also present the latest work in the IETF on DNS privacy. The talk will be pitched such that no detailed technical knowledge is required. We hope that attendees will gain some familiarity with how the DNS works, some key issues surrounding DNS operation, and how the DNS might touch on various areas of research within WAIS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tuesday 6th May Building 34 room 3001, 16.15-18.00 Presenting: Groups: A, B, C, D Marking Groups: E, F, G, H 16.20 Group A: The online workplace: virtuality 16.40 Group B: Open innovation and novel business practices 17.00Group C: Banter, jokes, freedom of speech and defamation 17.20 Group D: Security and privacy – legal overview

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Monday 12th May Building 34 Room 3001, 12.00-13.45 Su & Rikki Presenting: Groups: E, F, G, H Marking Groups: I, J, K, L Schedule and Topics 12.00-12.05: Introduction and protocol for the session 12.05-12.25 Group E: Creative commons, open source, open movements 12.25-12.45 Group F: Trolling, Banter, Cyber Hate, Online Bullying 12.45-13.05 Group G: Personal Privacy and Security 13.05-13.25 Group H: Crime online; cyber security 13.25-13.45: Wash-up: feedback session for presentation groups

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Speaker(s): Prof. David Evans Organiser: Dr Tim Chown Time: 22/05/2014 10:45-11:45 Location: B53/4025 Abstract Secure multi-party computation enables two (or more) participants to reliably compute a function that depends on both of their inputs, without revealing those inputs to the other party or needing to trust any other party. It could enable two people who meet at a conference to learn who they known in common without revealing any of their other contacts, or allow a pharmaceutical company to determine the correct dosage of a medication based on a patient’s genome without compromising the privacy of the patient. A general solution to this problem has been known since Yao's pioneering work in the 1980s, but only recently has it become conceivable to use this approach in practice. Over the past few years, my research group has worked towards making secure computation practical for real applications. In this talk, I'll provide a brief introduction to secure computation protocols, describe the techniques we have developed to design scalable and efficient protocols, and share some recent results on improving efficiency and how secure computing applications are developed.