Academic literature on the topic 'Personal data control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Personal data control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Personal data control"
Hodson, Hal. "Gatekeeper keeps your personal data under your control." New Scientist 220, no. 2937 (October 2013): 20–21. http://dx.doi.org/10.1016/s0262-4079(13)62382-9.
Full textPriisalu, Jaan, and Rain Ottis. "Personal control of privacy and data: Estonian experience." Health and Technology 7, no. 4 (June 15, 2017): 441–51. http://dx.doi.org/10.1007/s12553-017-0195-1.
Full textCeccato, Natalie, and Courtney Price. "When personal health data is no longer “personal”." Healthcare Management Forum 32, no. 6 (August 1, 2019): 326–28. http://dx.doi.org/10.1177/0840470419865851.
Full textRuggles, Myles. "Mixed Signals: Personal Data Control in the Intelligent Network." Media Information Australia 67, no. 1 (February 1993): 28–39. http://dx.doi.org/10.1177/1329878x9306700105.
Full textWhitley, Edgar A. "Informational privacy, consent and the “control” of personal data." Information Security Technical Report 14, no. 3 (August 2009): 154–59. http://dx.doi.org/10.1016/j.istr.2009.10.001.
Full textPangrazio, Luci, and Neil Selwyn. "‘Personal data literacies’: A critical literacies approach to enhancing understandings of personal digital data." New Media & Society 21, no. 2 (September 20, 2018): 419–37. http://dx.doi.org/10.1177/1461444818799523.
Full textDadalko, V. A., and E. A. Timofeev. "Fundamentals of setting the compliance control of personal data protection." National Interests: Priorities and Security 16, no. 2 (February 14, 2020): 339–50. http://dx.doi.org/10.24891/ni.16.2.339.
Full textFerrandu, Giovanni. "Control and protection tools of personal data in digital healthcare." Pharmaceuticals Policy and Law 19, no. 3-4 (October 17, 2018): 209–18. http://dx.doi.org/10.3233/ppl-180457.
Full textHeaven, Douglas. "Personal clouds let you take control of your own data." New Scientist 218, no. 2919 (June 2013): 22. http://dx.doi.org/10.1016/s0262-4079(13)61363-9.
Full textRagesh, G. K., and K. Baskaran. "Cryptographically Enforced Data Access Control in Personal Health Record Systems." Procedia Technology 25 (2016): 473–80. http://dx.doi.org/10.1016/j.protcy.2016.08.134.
Full textDissertations / Theses on the topic "Personal data control"
Allwine, Daniel Alan. "Personal computer based data acquisition, sensing and control." Ohio : Ohio University, 1993. http://www.ohiolink.edu/etd/view.cgi?ohiou1174932273.
Full textOlausson, Michaela. "User control of personal data : A study of personal data management in a GDPR-compliant grahpical user interface." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-75880.
Full textJensen, Torstein, and Knut Halvor Larsen. "Developing Patient Controlled Access : An Access Control Model for Personal Health Records." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9597.
Full textThe health and social care sector has a continuous growth in the use of information technology. With more and more information about the patient stored in different systems by different health care actors, information sharing is a key to better treatment. The introduction of the personal health record aims at making this treatment process easier. In addition to being able to share information to others, the patients can also take a more active part in their treatment by communicating with participants through the system. As the personal health record is owned and controlled by the patient with assistance from health care actors, one of the keys to success lies in how the patient can control the access to the record. In this master's thesis we have developed an access control model for the personal health record in a Norwegian setting. The development is based on different studies of existing similar solutions and literature. Some of the topics we present are re-introduced from an earlier project. Interviews with potential users have also been a valuable and important source for ideas and inspiration, especially due to the fact that the access control model sets high demands on user-friendliness. As part of the access control model we have also suggested a set of key roles for the personal health record. Through a conceptual implementation we have further shown that the access control model can be implemented. Three different solutions that show the conceptual implementation in the Indivo personal health record have been suggested, using the Extensible Access Control Markup Language as the foundation.
Yu, Sam Shaokai. "Performance analysis and call control procedures in high-speed multimedia personal wireless communications /." Title page, abstract and contents only, 1999. http://web4.library.adelaide.edu.au/theses/09PH/09phy936.pdf.
Full textWild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Doctoral thesis, Universitätsbibliothek Chemnitz, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-217284.
Full textWild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Universitätsverlag Chemnitz, 2016. https://monarch.qucosa.de/id/qucosa%3A20629.
Full textVan, der Westhuizen Eldridge Welner. "A framework for personal health records in online social networking." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1012382.
Full textWeston, Mindy. "The Right to Be Forgotten: Analyzing Conflicts Between Free Expression and Privacy Rights." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6453.
Full textGoratti, L. (Leonardo). "Design, analysis and simulations of medium access control protocols for high and low data rate applications." Doctoral thesis, Oulun yliopisto, 2011. http://urn.fi/urn:isbn:9789514296512.
Full textTiivistelmä Kahden viime vuosikymmenen aikana innovatiivisella langattomalla tekniikalla varustettujen viestintälaiteiden määrä on kasvanut räjähdysmäisesti. Lyhyen kantaman verkkoja kuten langattomia henkilökohtaisen alueen verkkoja (WPAN), langattomia anturiverkkoja (WSN) ja langattomia vartaloalueen verkkoja (WBAN) on määritelty ja tutkittu, jotta voitaisiin tuottaa korkeanopeuksisia kotiyhteyksiä sekä välineitä ympäristön ja terveydentilan seurantaan. Tämä väitöskirja käsittelee lyhyen kantaman viestintään suunniteltujen linkinohjauskerroksen MAC-protokollien suunnittelua, analysointia ja simulointia. Näissä kaikissa käytetään akkukäyttöisiä laitteita, mutta myös tietyt MAC-protokollien suunnittelun haasteet ovat tavallisia fyysisen kerroksen teknologiaa valittaessa. Ultra-laajakaistainen (UWB) teknologia ja 60 GHz teknologia (eli millimetriaallonpituusalueen tietoliikenne) ovat hyviä esimerkkejä kuluneen vuosikymmenen langattomasta vallankumouksesta. Tässä väitöskirjassa huomioidaan UWB teknologiaan liittyvää MAC-kerroksen analyysiä tehtäessä useat olemassa olevat standardit, kuten IEEE 802.15.3, ECMA-368, IEEE 802.15.4 ja sen lisäys IEEE 802.15.4a. Millimetriaallonpituusalueen tietoliikenteessä huomioidaan myös IEEE 802.15.3c standardin erityispiirteet. IEEE 802.15.3c:tä lukuun ottamatta kaikki MAC-protokollat on mallinnettu Opnet verkkosimulaattorilla. Tämä tutkimus tarjoaa innovatiivisen ja syväluotaavan tutkimuksen näiden standardien pohjalta ja analyyttisten ja simuloitujen mallien avulla kehitetyistä hallinnallisista lähestymistavoista (esim. ECMA-368 hajautettu majakkasignaali). Näiden avulla voidaan valita kohteena oleviin sovelluksiin ja teknologioihin parhaiten soveltuvia MAC-ominaisuuksia. Kaikkien protokollien analysointiin käytetty ensisijainen suorituskykymittari on energiatehokkuus, mutta myös datanopeuksia on tarkasteltu. Tässä tutkimuksessa esitellään myös innovatiivinen tapa tutkia MAC protokollia integroituina konsepteina suhteessa verkon ja sovellusten tyyppiin sekä fyysisen kerroksen teknologiaan. Lisäksi tämä väitöskirja esittelee MAC suorituskykyä UWB verkossa silloin, kun siinä otetaan huomioon väärät hälytykset, väärä havainnointi ja vastaanottimen signaalinkaappaus (vastaanoton mallintamiseksi käytetään olemassa olevaa interferenssimallia). MAC analyysistä poistetaan useimmat epärealistiset, vaikkakin tavalliset, olettamukset, ja verkkojen suorituskykyä tarkastellaan valittujen kriittisten parametrien monitoroinnissa Opnet-simulaatioiden avulla. Tunnettua binäärijakoinen eksponentiaalinen perääntyminen -algoritmia analysoidaan innovatiivisella, yksinkertaistetulla yksiulotteisella Markov-ketju -mallilla 60 GHz:n suunta-antenni MAC:n yhteydessä. Kuten tässä tutkimuksessa tullaan osoittamaan, esitelty yksinkertaistus ei rajoita tulosten tarkkuutta, vaan mukaan voidaan lukea jopa rajallinen määrä uudelleenlähetyksiä yksinkertaisen Markovin ketjun laajennuksen avulla
Bantom, Simlindile Abongile. "Accessibility to patients’ own health information: a case in rural Eastern Cape, South Africa." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2411.
Full textAccess to healthcare is regarded as a basic and essential human right. It is widely known that ICT solutions have potential to improve access to healthcare, reduce healthcare cost, reduce medical errors, and bridge the digital divide between rural and urban healthcare centres. The access to personal healthcare records is, however, an astounding challenge for both patients and healthcare professionals alike, particularly within resource-restricted environments (such as rural communities). Most rural healthcare institutions have limited or non-existent access to electronic patient healthcare records. This study explored the accessibility of personal healthcare records by patients and healthcare professionals within a rural community hospital in the Eastern Cape Province of South Africa. The case study was conducted at the St. Barnabas Hospital with the support and permission from the Faculty of Informatics and Design, Cape Peninsula University of Technology and the Eastern Cape Department of Health. Semi-structured interviews, observations, and interactive co-design sessions and focus groups served as the main data collection methods used to determine the accessibility of personal healthcare records by the relevant stakeholders. The data was qualitatively interpreted using thematic analysis. The study highlighted the various challenges experienced by healthcare professionals and patients, including time-consuming manual processes, lack of infrastructure, illegible hand-written records, missing records and illiteracy. A number of recommendations for improved access to personal healthcare records are discussed. The significance of the study articulates the imperative need for seamless and secure access to personal healthcare records, not only within rural areas but within all communities.
Books on the topic "Personal data control"
Ozkul, Tarik. Data acquisition and process control using personal computers. New York: Marcel Dekker, 1996.
Find full textJoseph, Babu. Real-time personal computing: For data acquisition and control. Englewood Cliffs, N.J: Prentice-Hall, 1989.
Find full textControl technology and personal computers: System design and implementation. New York: Van Nostrand Reinhold, 1992.
Find full textProperty rights in personal data: A European perspective. Alphen aan den Rijn, The Netherlands: Kluwer Law International, 2012.
Find full textProtecting personal health information in Ireland: Law & practice. Cork: Oak Tree, 2005.
Find full textSteinauer, Dennis. Security of personal computer systems: A management guide. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1985.
Find full textSchifreen, Robert. Data protection and security for personal computers: A manager's guide to improving the confidentiality availability and integrity of data on personal computers and local area networks. Oxford, UK: Elsevier Advanced Technology, 1992.
Find full textZimmerman, Steven M. QCPAC: Statistical quality control on the IBM PC. New York: M. Dekker, 1985.
Find full textPersonal data privacy and protection in a survillance era: Technologies and practices. Hershey, PA: Information Science Reference, 2011.
Find full textBook chapters on the topic "Personal data control"
Issa, Omneya, and Jean-Charles Grégoire. "A QoS Control Scheme for Voice and Data Services in cdma2000 System." In Personal Wireless Communications, 498–504. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39867-7_48.
Full textShulman, Yefim, Thao Ngo, and Joachim Meyer. "Order of Control and Perceived Control over Personal Information." In Privacy and Identity Management. Data for Better Living: AI and Privacy, 359–75. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42504-3_23.
Full textGurkov, Alexander. "Personal Data Protection in Russia." In The Palgrave Handbook of Digital Russia Studies, 95–113. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42855-6_6.
Full textBusacca, Angela, and Melchiorre A. Monaca. "Processing of Personal Data and AI: GDPR Guarantees and Limits (Between Individual Data and BIG DATA)." In Studies in Systems, Decision and Control, 51–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45340-4_6.
Full textRath, Annanda Thavymony, and Jean-Noël Colin. "Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System." In Data and Applications Security and Privacy XXIX, 233–41. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20810-7_16.
Full textPurevjii, Bat-Odon, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori, and Cherri M. Pancake. "Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach." In Computational Intelligence and Security, 548–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596981_81.
Full textBuyle, Raf, Ruben Taelman, Katrien Mostaert, Geroen Joris, Erik Mannens, Ruben Verborgh, and Tim Berners-Lee. "Streamlining Governmental Processes by Putting Citizens in Control of Their Personal Data." In Communications in Computer and Information Science, 346–59. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39296-3_26.
Full textSolanki, Manishkumar R. "SOLID: A Web System to Restore the Control of Users’ Personal Data." In Advances in Intelligent Systems and Computing, 257–67. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8289-9_24.
Full textUrsic, Helena. "The Failure of Control Rights in the Big Data Era: Does a Holistic Approach Offer a Solution?" In Personal Data in Competition, Consumer Protection and Intellectual Property Law, 55–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-57646-5_4.
Full textZinke, Christian, Jürgen Anke, Kyrill Meyer, and Johannes Schmidt. "Modeling, Analysis and Control of Personal Data to Ensure Data Privacy – A Use Case Driven Approach." In Advances in Intelligent Systems and Computing, 87–96. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60585-2_10.
Full textConference papers on the topic "Personal data control"
Marques, Hugo, Hugo Carvalho, Jose Morgado, Nuno M. Garcia, Ivan Miguel Pires, and Eftim Zdravevski. "Control and Prevention of Personal Stress." In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 2020. http://dx.doi.org/10.1109/bigdata50022.2020.9378311.
Full textMuciņa, Elīna. "Data Subjects’ Control Over Their Personal Data." In The 7th International Scientific Conference of the Faculty of Law of the University of Latvia. LU Akadēmiskais apgāds, 2019. http://dx.doi.org/10.22364/iscflul.7.43.
Full textWang, Ting, Mudhakar Srivatsa, and Ling Liu. "Fine-grained access control of personal data." In the 17th ACM symposium. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2295136.2295165.
Full textZichichi, Mirko, Stefano Ferretti, Gabriele D'Angelo, and Victor Rodriguez-Doncel. "Personal Data Access Control Through Distributed Authorization." In 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA). IEEE, 2020. http://dx.doi.org/10.1109/nca51143.2020.9306721.
Full textAlmgren, R. C. "Data Acquisition And Instrument Control With Personal Computers." In Electro International, 1991. IEEE, 1991. http://dx.doi.org/10.1109/electr.1991.718288.
Full textVillegas, Wilfred, Bader Ali, and Muthucumaru Maheswaran. "An Access Control Scheme for Protecting Personal Data." In 2008 Sixth Annual Conference on Privacy, Security and Trust (PST). IEEE, 2008. http://dx.doi.org/10.1109/pst.2008.14.
Full textHavur, Giray, Miel Sande, and Sabrina Kirrane. "Greater Control and Transparency in Personal Data Processing." In 6th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009143206550662.
Full textMitchell, P. D. "Effective medium access control for satellite broadband data traffic." In IEE Seminar Personal Broadband Satellite. IEE, 2002. http://dx.doi.org/10.1049/ic:20020022.
Full textAmsterdamer, Yael, and Osnat Drien. "PePPer: Fine-Grained Personal Access Control via Peer Probing." In 2019 IEEE 35th International Conference on Data Engineering (ICDE). IEEE, 2019. http://dx.doi.org/10.1109/icde.2019.00227.
Full textCHEN, DONGMING, JIANHUA MA, RUNHE HUANG, and SONG ZHANG. "Growable Cyber I s Modeling with Increasing Personal Data." In International Conference on Advances in Computing, Control and Networking - ACCN 2015. Institute of Research Engineers and Doctors, 2015. http://dx.doi.org/10.15224/978-1-63248-038-5-84.
Full textReports on the topic "Personal data control"
Candrilli, Sean D., and Samantha Kurosky. The Response to and Cost of Meningococcal Disease Outbreaks in University Campus Settings: A Case Study in Oregon, United States. RTI Press, October 2019. http://dx.doi.org/10.3768/rtipress.2019.rr.0034.1910.
Full textHaddock, John E., Reyhaneh Rahbar-Rastegar, M. Reza Pouranian, Miguel Montoya, and Harsh Patel. Implementing the Superpave 5 Asphalt Mixture Design Method in Indiana. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317127.
Full textStall, Nathan M., Kevin A. Brown, Antonina Maltsev, Aaron Jones, Andrew P. Costa, Vanessa Allen, Adalsteinn D. Brown, et al. COVID-19 and Ontario’s Long-Term Care Homes. Ontario COVID-19 Science Advisory Table, January 2021. http://dx.doi.org/10.47326/ocsat.2021.02.07.1.0.
Full text