176,889 research outputs found

    An Examination of Privacy Policies of US Government Senate Websites.

    Get PDF
    US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy policies. This research studied privacy policy protection of 50 US Senate sites and found that few had comprehensive elements of privacy policies and a general lack of protection of personal data that could be obtain from the website. The study reviewed which specific privacy elements are most often mishandled, as well as suggestions for improving an overall online privacy practice

    Quality interoperability within digital libraries: the DL.org perspective

    Get PDF
    Quality is the most dynamic aspect of DLs, and becomes even more complex with respect to interoperability. This paper formalizes the research motivations and hypotheses on quality interoperability conducted by the Quality Working Group within the EU-funded project DL.org (<a href="http://www.dlorg.eu">http://www.dlorg.eu/</a>). After providing a multi-level interoperability framework – adopted by DL.org - the authors illustrate key-research points and approaches on the way to the interoperability of DLs quality, grounding them in the DELOS Reference Model. By applying the DELOS Reference Model Quality Concept Map to their interoperability motivating scenario, the authors subsequently present the two main research outcomes of their investigation - the Quality Core Model and the Quality Interoperability Survey

    Human Resource Management in New Jersey State Government

    Get PDF
    In 2005, the State of New Jersey Department of Personnel commissioned the Heldrich Center to study the critical human resource management issues confronting New Jersey state government. This report highlights the study's findings including: the human resource management function must be elevated to a position of primacy in state government, the state must reengineer the Department of Personnel into an effective human resource management agency with a broader mission than overseeing transactions and compliance with statutes and regulations, and the state must support its human resource function with adequate staff resources

    Preservation of Web Resources: The JISC PoWR Project

    Get PDF
    This paper describes the work of the JISC-funded PoWR (Preservation Of Web Resources) project which is developing a handbook on best practices and advice aimed at UK higher and further educational institutions for the preservation of Web sites and Web resources. The paper summarises the challenges institutions face in preserving Web resources, describes the workshops organized by the project in order to identify the challenges and identify appropriate best practices, and outlines areas in which further work is required

    Empirical Study of Privacy Issues Among Social Networking Sites.

    Get PDF
    Social media networks are increasing their types of services and the numbers of users are rapidly growing. However, online consumers have expressed concerns about their personal privacy protection and recent news articles have shown many privacy breaches and unannounced changes to privacy policies. These events could adversely affect data protection and compromise user trust, thus it is vital that social sites contain explicit privacy policies stating a comprehensive list of protection methods. This study analyzes 60 worldwide social sites and finds that even if sites contain a privacy policy, the site pages may also possess technical elements that could be used to serendipitously collect personal information. The results show specific technical collection methods most common within several social network categories. Methods for improving online privacy practices are suggested

    A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view
    • …
    corecore