We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 101-120 of 144 results
  1. Using Personal Data to Advance Preventive Healthcare Services

    Services are becoming increasingly digitally enabled and data-driven. Big data, and especially a subset of big data called personal data, is expected...

    Article 30 June 2018
  2. Visions for the Financial Supply Chain

    Our capacity for real, meaningful change is limited in part by our imagination and in part by the true desire to change. Although it is easy to point...
    Tim de Knegt in Finance Unleashed
    Chapter 2018
  3. The Price of Privacy

    The analysis of clickstream data facilitates the understanding and prediction of customer behavior in e-commerce. Companies can leverage such data to...

    Annika Baumann, Johannes Haupt, ... Stefan Lessmann in Business & Information Systems Engineering
    Article 21 February 2018
  4. Anonymization Techniques

    Mick Smith, Rajeev Agrawal in Encyclopedia of Big Data
    Living reference work entry 2017
  5. Ground Transportation Big Data Analytics and Third Party Validation: Solutions for a New Era of Regulation and Private Sector Innovation

    One of the first systematic collections of ground transportation big data was instituted by the New York City Taxi & Limousine Commission (“TLC”) in...
    Chapter 2019
  6. Ideengenerierung durch Accelerator und Entwicklerportale

    Auf Mobilitätsplattformen sollen innovative Mobilitätsdienste entstehen. Diese werden nicht nur vom Plattformbetreiber selbst, sondern auch von...
    Maximilian Schreieck, Christoph Pflügler, ... Helmut Krcmar in Management digitaler Plattformen
    Chapter 2018
  7. Perspectives on Luxury: An Integrative Model

    What is luxury? This question is a fundamental question for research and yet the only agreement reached is that its answer remains unclear (cf....
    Chapter 2020
  8. Big Data and Privacy Fundamentals: Toward a “Digital Skin”

    While witnessing the advent of the big data era, the unstoppable propagation of the European Union’s General Data Protection Rule (GDPR) and the...
    Chapter 2017
  9. Prioritizing and Ranking the Big Data Information Security Risk Spectrum

    Big data research brings in a lot of research interest and excitement from both industry and academia. While several research works have addressed...

    Article 09 May 2017
  10. Driving innovation through big open linked data (BOLD): Exploring antecedents using interpretive structural modelling

    Innovation is vital to find new solutions to problems, increase quality, and improve profitability. Big open linked data (BOLD) is a fledgling and...

    Yogesh K. Dwivedi, Marijn Janssen, ... Dhoya Snijders in Information Systems Frontiers
    Article Open access 13 July 2016
  11. Editorial 25/2: Electronic Markets and privacy

    Rainer Alt, Carsta Militzer-Horstmann, Hans-Dieter Zimmermann in Electronic Markets
    Article 14 May 2015
  12. An unsupervised approach for traffic trace sanitization based on the entropy spaces

    The accuracy and reliability of an anomaly-based network intrusion detection system are dependent on the quality of data used to build a normal...

    Pablo Velarde-Alvarado, Cesar Vargas-Rosales, ... Alberto F. Martinez-Herrera in Telecommunication Systems
    Article 31 March 2015
  13. Following value chains

    Scholars working in the field of marketization studies have never settled on a singular methodology. Neither have they set disciplinary boundaries or...
    Dorothee Niebuhr in Making Global Value Chains
    Chapter 2016
  14. An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata

    The collection, processing, and selling of personal data is an integral part of today’s electronic markets, either as means for operating business,...

    Peter Kieseberg, Sebastian Schrittwieser, ... Edgar Weippl in Electronic Markets
    Article 29 April 2014
  15. Introduction

    ABC4Trust advances trustworthy yet privacy-protecting ways of identity management. Therefore this chapter starts with an introduction to identity...
    Kai Rannenberg, Welderufael Tesfay, Ahmad Sabouri in Attribute-based Credentials for Trust
    Chapter 2015
  16. Semantic integration of enterprise information systems using meta-metadata ontology

    This paper proposes a non-domain-specific metadata ontology as a core component in a semantic model-based document management system (DMS), a...

    Igor Cverdelj-Fogaraši, Goran Sladić, ... Branko Milosavljević in Information Systems and e-Business Management
    Article 16 January 2016
  17. Security and privacy in business networking

    Business networking relies on application-specific quantity and quality of information in order to support social infrastructures in, e.g., energy...

    Sven Wohlgemuth, Stefan Sackmann, ... A Min Tjoa in Electronic Markets
    Article 14 May 2014
  18. Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust

    In this chapter we describe one of the pilots of the ABC4Trust project that we developed in order to offer privacy-preserving course evaluations at...
    Yannis Stamatiou, Zinaida Benenson, ... Welderufael Tesfay in Attribute-based Credentials for Trust
    Chapter 2015
  19. An Architecture for Privacy-ABCs

    One of the main objectives of the ABC4Trust project was to define a common, unified architecture for Privacy-ABC systems to allow comparing their...
    Patrik Bichsel, Jan Camenisch, ... Ahmad Sabouri in Attribute-based Credentials for Trust
    Chapter 2015
Did you find what you were looking for? Share feedback.