We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,108 results
  1. Personal space invasion to prevent cyberbullying: design, development, and evaluation of an immersive prevention measure for children and adolescents

    The previous work on cyberbullying has shown that the number of victims is increasing, and the need for prevention is exceptionally high among...

    Carolin Wienrich, Viktoria Horn, ... Arne Bürger in Virtual Reality
    Article Open access 15 March 2024
  2. Occupying Another’s Digital Space: Privacy of Smartphone Users as a Situated Practice

    A smartphone’s screen is commonly regarded as a private space, and the action of looking at it is usually considered a violation of one’s privacy...

    Iuliia Avgustis, Samira Ibnelkaïd, Netta Iivari in Computer Supported Cooperative Work (CSCW)
    Article Open access 23 February 2024
  3. Prolific detect and prevent invasion architecture with curvaceous K-pro acted neural nets for alpine the security in networking

    Internet plays an essential role in day today’s life and today’s generation rely on the internet for social, personal, and professional activities....

    Akshay Rameshbhai Gupta, Jitendra Agrawal in International Journal of Information Technology
    Article 08 January 2022
  4. Autonomous Navigation Method Considering Passenger Comfort Recognition for Personal Mobility Vehicles in Crowded Pedestrian Spaces

    Autonomous navigation systems for personal mobility vehicles are being developed to support mobility in large-scale facilities such as airports and...
    Yosuke Isono, Hiroshi Yoshitake, Motoki Shino in Computer Vision, Imaging and Computer Graphics Theory and Applications
    Conference paper 2023
  5. Industrialising Blackmail: Privacy Invasion Based IoT Ransomware

    Ransomware (malware that threatens to lock or publish victims’ assets unless a ransom is paid) has become a serious security threat, targeting...
    Calvin Brierley, Budi Arief, ... Julio Hernandez-Castro in Secure IT Systems
    Conference paper 2021
  6. Please Stop Listening While I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration

    In recent years, research on Voice Assistant has been actively conducted in the areas of human interaction and lifestyle. The characteristic that...
    Jongkeon Kim, Jeongyun Heo in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2021
  7. Nuclear energy: Twitter data mining for social listening analysis

    Knowing the presence, attitude and sentiment of society is important to promote policies and actions that influence the development of different...

    Enara Zarrabeitia-Bilbao, Maite Jaca-Madariaga, ... Izaskun Álvarez-Meaza in Social Network Analysis and Mining
    Article Open access 06 February 2023
  8. Appeal of Inconspicuous Body Movements During Spatial Invasion

    This paper described a psychophysical study on inconspicuous but distinguishable characteristic body movements while a person encountered an...
    Conference paper 2020
  9. Data Protection and Privacy: Risks and Solutions in the Contentious Era of AI-Driven Ad Tech

    Internet Service Providers (ISPs) exponentially incorporate Artificial Intelligence (AI) algorithms and Machine Learning techniques to achieve...
    Conference paper 2024
  10. Cryptography

    As society speeds, and in most cases is literally dragged, into the new information society, the kind of face-to-face and paper-traceable...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  11. Internet privacy, technology, and personal information

    Computer programs are used to obtain and store information about the online activities of users of the web. Many people are concerned about this...

    Marjorie S. Price in Ethics and Information Technology
    Article 02 January 2020
  12. Shifted window-based Transformer with multimodal representation for the systematic staging of rectal cancer

    Systematic staging of rectal cancer aims to determine tumor invasion degree and lymph node metastasis (LNM) status. Artificial intelligence...

    Article 14 May 2024
  13. An investigation of the social media overload and academic performance

    In the realm of online learning, social media is emerging as an indispensable tool for student learning. While social media offers benefits for...

    **ongfei Cao, Yuntao Wu, ... Ahsan Ali in Education and Information Technologies
    Article 02 October 2023
  14. Privacy preserving cold-start recommendation for out-of-matrix users via content baskets

    Guest users, single-time clients who use an online service anonymously without prior registration, are common in real-world recommendation...

    Article 12 March 2023
  15. Ecosystem Services from Space as Evaluation Metric of Human Well-Being in Deprived Urban Areas of the Majority World

    This chapter presents a concise synthesis of recent research efforts, emphasizing the combined use of ecosystem services and landscape metric...
    Chapter 2024
  16. Digital Twins and Basic Digital Student Profiles

    Abstract

    Trends in the implementation of digital twins (DTs) of real-world objects for the effective and safe management of complex sociotechnical...

    K. V. Pitelinsky, V. V. Britvina, A. V. Aleksandrova in Automatic Documentation and Mathematical Linguistics
    Article 01 February 2024
  17. Psychometric properties of the French version of the technostress creators and inhibitors scale

    This study’s aim is to adapt the theory of technostress creators and inhibitors (Ragu-Nathan et al. 2008; Inf Sys Res 19(4):417–433. https://doi.org/10.1287/isre.1070.0165...

    José Manuel Castillo, Edith Galy, Pierre Thérouanne in Cognition, Technology & Work
    Article 17 September 2023
  18. Moral Dilemmas in Social Robots: An Exploratory Study for Future Research

    This study examines the ethical issues related to technological advancements in social robots. We argue that a relationship exists between the...
    Muhammad Umair Shah, Patrick C. K. Hung, ... Inon Wiratsin in Human-Computer Interaction
    Conference paper 2023
  19. Is academic writing less passivized? Corpus-based evidence from research article abstracts in applied linguistics over the past three decades (1990–2019)

    The passive voice is an essential construction for packaging information. Previous studies observed a trend that academic writing in the late half of...

    Zhijun Li in Scientometrics
    Article 22 August 2022
  20. Cultural behaviors analysis in video sequences

    In this paper, we investigate the cultural aspects of different populations from video sequences. For that, we proposed a model that considers a...

    Rodolfo Migon Favaretto, Victor Flavio de Andrade Araujo, ... Soraia Raupp Musse in Machine Vision and Applications
    Article 04 July 2021
Did you find what you were looking for? Share feedback.