Auflistung nach Schlagwort "Identification"
1 - 4 von 4
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragApp-generated digital identities extracted through Android permission-based data access - a survey of app privacy(SICHERHEIT 2020, 2020) Momen, Nurul; Fritsch, LotharSmartphone apps that run on Android devices can access many types of personal information. Such information can be used to identify, profile and track the device users when mapped into digital identity attributes. This article presents a model of identifiability through access to personal data protected by the Android access control mechanism called permissions. We present an abstraction of partial identity attributes related to such personal data, and then show how apps accumulate such attributes in a longitudinal study that was carried out over several months. We found that apps' successive access to permissions accumulates such identity attributes, where different apps show different interest in such attributes.
- KonferenzbeitragExplaining ECG Biometrics: Is It All In The QRS?(BIOSIG 2020 - Proceedings of the 19th International Conference of the Biometrics Special Interest Group, 2020) Pinto, João Ribeiro; Cardoso, Jaime S.The literature seems to indicate that the QRS complex is the most important component of the electrocardiogram (ECG) for biometrics. To verify this claim, we use interpretability tools to explain how a convolutional neural network uses ECG signals to identify people, using on-theperson (PTB) and off-the-person (UofTDB) signals. While the QRS complex appears indeed to be a key feature on ECG biometrics, especially with cleaner signals, results indicate that, for larger populations in off-the-person settings, the QRS shares relevance with other heartbeat components, which it is essential to locate. These insights indicate that avoiding excessive focus on the QRS complex, using decision explanations during training, could be useful for model regularisation.
- ZeitschriftenartikelIs it Worth the Effort?(Business & Information Systems Engineering: Vol. 59, No. 2, 2017) Meier, Christian; Kundisch, Dennis; Willeke, JochenThe adequate consideration of resource interactions among IS projects is a challenging but important requirement within IS project portfolio selection. However, the literature does not mention any potential techniques for the identification and assessment of resource interactions. Moreover, the literature has so far neglected the question of the trade-off between time and effort invested in identifying and evaluating resource interactions caused by resource sharing among projects, compared to the benefits derived from this procedure. Hence, the paper’s contribution is twofold. First, a technique to support the identification and evaluation of potentially economically relevant resource interactions is suggested. Second, the paper proposes a decision model that allows to calculate a theoretical upper bound for the amount of effort that should be invested in improving estimates for identified interactions as part of the portfolio planning process.
- KonferenzbeitragRole of Identity, Identification, and Receipts for Consent(Open Identity Summit 2021, 2021) J. Pandit, Harshvardhan; Jesus, Vitor; Ammai, Shankar; Lizar, Mark; D’Agostino, SalvatoreThis article outlines issues in the current ecosystem of data sharing based on consent and the role of identity and identification. It argues how the consent mechanism is hostile to individuals in the form of: (a) inscrutable third parties who remain largely unknown; (b) denying ability to identify and manage consent; and (c) lack of technological solution. The article discusses the role and feasibility of Consent Receipts, and presents its role in the Privacy as Expected: Consent Gateway (PaE:CG) project for the future of accountable identity and identification mechanisms for consent.