Minimising Information Asymmetry by Using Proxies
|
|
- Darrell Curtis
- 5 years ago
- Views:
Transcription
1 Minimising Information Asymmetry by Using Proxies Anders Kofod-Petersen IMIS Anders Kofod-Petersen Minimising Information Asymmetry by Using Proxies
2 Outline 1 Motivation and Background Motivation FindMyFriends FriendRadar (and Find Peer Anton) The principle 2 Privacy in the AAL domain Mpower and UniversAAL Current situation Using a proxy to minimise asymmetry 3 Summary 2 Anders Kofod-Petersen Minimising Information Asymmetry by Using Proxies
3 Motivation Motivation and Background Motivation Privacy is important when we (deliberately) share data It is even more important when we share sensed data We really like to monitor people, in particular elderly (AAL) "Informed users" tend to prefer coolness over privacy But what about non-competent or non-informed users? 3 Anders Kofod-Petersen Minimising Information Asymmetry by Using Proxies
4 FindMyFriends Motivation and Background FindMyFriends Location-based system implemented at a student festival 2769 registered users 1661 users with registered tags Only privacy mechanism was "blocking a user" Main finding was that the benefits outweighed any negative aspects (n=207, cl 95 %, ci 6.55 %) 4 Anders Kofod-Petersen Minimising Information Asymmetry by Using Proxies
5 Motivation and Background FriendRadar (and Find Peer Anton) FriendRadar (and Find Peer Anton) FriendRadar was a city-wide system that allows you to see the location of your friends Find Peer Anton was the same just "GSM-wide" Privacy mechanism were: 1 Subscribing to another s presence or location information is only possible by mutual sharing. 2 Being invisible stops the user from receiving other users information. 3 Cancelling a subscription removes the cancelled user form the list and marks the cancelling user as offline in other users list. Main finding was that "coolness" outweighed any privacy issues (n=24) 5 Anders Kofod-Petersen Minimising Information Asymmetry by Using Proxies
6 Motivation and Background The principle Principle of minimal asymmetry "A privacy-aware system should minimize the asymmetry of information between data owners and data collectors and data users, by: Decreasing the flow of information from data owners to data collectors and users. Increasing the flow of information from data collectors and users back to the data owners." [Jiang et al., 2002] Decreasing information flow from the data owner improves control. Increasing information flow from the collector provides feedback. 6 Anders Kofod-Petersen Minimising Information Asymmetry by Using Proxies
7 Privacy in the AAL domain MPower and UniversAAL Mpower and UniversAAL MPower was a FP6 project that constructed a collaborative environment for distributed and shared care UniversAAL is a continuation (FP7) of, among others MPower that aim at consolidation one European platform for AAL services 7 Anders Kofod-Petersen Minimising Information Asymmetry by Using Proxies
8 Privacy in the AAL domain Current situation Current situation Service Service Service MPOWER Sensor 5 Sensor 4 Sensor 3 Sensor 2 Sensor 1 8? Anders Kofod-Petersen Minimising Information Asymmetry by Using Proxies
9 Privacy in the AAL domain Using a proxy to minimise asymmetry Using a proxy to minimise asymmetry? 9 Anders Kofod-Petersen Minimising Information Asymmetry by Using Proxies
10 Summary Summary We have seen that "usefulness" often outweighs privacy concerns Some examples of systems that attempts to minimise asymmetry has been described Non-competent and non-informed users are in a special situation Minimising asymmetry has been suggested as a suitable mechanism, also in the AAL domain It has been argued that designing AAL systems to (explicitly) care for proxies is necessary Applying this principle is basically an engineering problem However, the non-technical issues needs to be tackled 10 Anders Kofod-Petersen Minimising Information Asymmetry by Using Proxies
A Location Model for Ambient Intelligence
A Location Model for Ambient Intelligence National Institute of Informatics, Japan Email: ichiro@nii.ac.jp Outline 1. Motivation 2. Approach 3. Location Model 4. Design and Implementation 5. Applications
More informationA Way to Personalize In-Home Healthcare and Assisted Living
Knowledge Foundation A Way to Personalize In-Home Healthcare and Assisted Living Wagner Ourique de Morais CERES Centre for Research on Embedded Systems CAISR Centre for Applied Intelligent Systems Research
More informationAlternative Network Deployments: Taxonomy, characterization, technologies and architectures
Alternative Network Deployments: Taxonomy, characterization, technologies and architectures draft-irtf-gaia-alternative-network-deployments-01 Authors: J. Saldana, University of Zaragoza, Ed. A. Arcia-Moret,
More informationBOLT eportfolio Student Guide
BOLT eportfolio Student Guide Contents BOLT EPORTFOLIO STUDENT GUIDE... I BOLT EPORTFOLIO BASICS... 3 BOLT eportfolio user interface overview... 3 Dashboard... 3 My Items Page... 4 Explore Page... 5 Sharing
More informationIntelligent care assistance for the support of loved ones. Miran Mosmondor, MSc Senior Researcher Research & Innovations Unit Zagreb, Croatia
Intelligent care assistance for the support of loved ones Miran Mosmondor, MSc Senior Researcher Research & Innovations Unit Zagreb, Croatia Overview 10+Years Intelligent Care Assistance Working on challenges
More informationInformation Technology Branch Organization of Cyber Security Technical Standard
Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:
More informationMobile Security Fall 2012
Mobile Security 14-829 Fall 2012 Patrick Tague Class #9 The Internet of Things Partial slide credit to L. Zoia and Y. Zhang Announcements If you haven't signed up for a Survey presentation (two teams,
More informationArchitectural Styles - Finale
Material and some slide content from: - Emerson Murphy-Hill - Software Architecture: Foundations, Theory, and Practice - Essential Software Architecture Architectural Styles - Finale Reid Holmes Lecture
More information1. Context-Awareness 2. Context-Aware Service 3. Context-aware mobile computing 4. Semantic Technology
상황인지사례와시맨틱기술 (1) 1. Context-Awareness 2. Context-Aware Service 3. Context-aware mobile computing 4. Semantic Technology Conceptual Framework for Pervasive Context-Awareness Basic elements of a pervasive
More informationSecure Multi-party Computation
Secure Multi-party Computation What it is, and why you d care Manoj Prabhakaran University of Illinois, Urbana-Champaign SMC SMC SMC conceived more than 30 years back SMC SMC conceived more than 30 years
More informationHow to add a Forum. Outline: The purpose of this guide is to show users how to add a Forum activity inside the LMS. What will the guide cover?
Page 1 of 15 How to add a Forum The Forum activity allows students to exchange ideas about a topic in a public discussion forum by posting comments. You can use the Forum activity to post important messages,
More informationEZSHARE: PEER-TO-PEER FILE SYSTEM
COSC 4319: DISTRIBUTED OBJECT COMPUTING PROJECT DEVELOPMENT REPORT 29 TH OCTOBER 2003 EZSHARE: PEER-TO-PEER FILE SYSTEM ezshare Repository Peer PC Peer PC Peer PC ezshare Development Report 1 TEAM MEMBERS
More informationThe universaal UI Framework.
The universaal UI Framework saied.tazari@igd.fraunhofer.de 1 Personalized UI @ AAL Forum 2012 Note the abbreviation UI throughout this presentation stands for User Interaction and not for user interface
More informationeportfolios: Process and Product
eportfolios: Process and Product March 2015 Katherine Lithgow Mark Morton Learning Outcomes of Today s Session After the session, participants will be able to: explain how eportfolios can enhance student
More informationCoach Training Resource
Coach Training Resource Table of Contents INTRODUCTION... 1 UPDATING YOUR DETAILS... 1 MY PROFILE... 1 Career Field criteria... 1 ACCOUNT... 2 Account Info... 2 Participation... 2 Communication... 3 COACHING
More informationFunctionality, Challenges and Architecture of Social Networks
Functionality, Challenges and Architecture of Social Networks INF 5370 Outline Social Network Services Functionality Business Model Current Architecture and Scalability Challenges Conclusion 1 Social Network
More informationMyUni - Discussion Boards, Blogs, Wikis & Journals
- Discussion Boards, Blogs, Wikis & Journals Discussion Boards... 2 Create a discussion board forum... 2 Discussion Board Threads... 2 Create a thread... 2 Reply to a thread... 2 Forum settings... 3 Edit
More informationData Controller and Owner. Types of Data collected. Mode and place of processing the Data. Privacy Policy of aimedis.com. Methods of processing
Privacy Policy of aimedis.com This Application collects some Personal Data from its Users. Data Controller and Owner Aimedis B.V., Sint Michaëlstraat 4, 5935 BL Steyl, Netherlands Owner contact email:
More informationTEXT ANALYTICS USING AZURE COGNITIVE SERVICES
EMAIL TEXT ANALYTICS USING AZURE COGNITIVE SERVICES Feature that provides Organizations Language Translation and Sentiment Score for Email Text Messages using Azure s Cognitive Services. MICROSOFT LABS
More informationOptimization in Data Centres. Jayantha Siriwardana and Saman K. Halgamuge Department of Mechanical Engineering Melbourne School of Engineering
Optimization in Data Centres Jayantha Siriwardana and Saman K. Halgamuge Department of Mechanical Engineering Melbourne School of Engineering Outline Background and Motivation Overview and scale of data
More informationMoodle is a virtual learning environment that allows you to access learning materials required for your module.
What is Moodle? Moodle is a virtual learning environment that allows you to access learning materials required for your module. At the start of term, you are normally automatically registered on your chosen
More informationCopyright 2011 AANAC
Copyright 2011 AANAC Tips & Tricks The webinar will start shortly. The following is a preview to start getting you acquainted with the site. Copyright 2011 AANAC Important note To ensure the emails from
More informationSubscribing Journals by proxy (International) Operation Guide
Subscribing Journals by proxy (International) Operation Guide For proxy applicants and department libraries This manual covers procedures for performing an operation on behalf of a Budget Administrator
More informationFor more details and updates go to our website, boatcommand.com.
Installation Manual Compatibility Compatibility is easy. Our device needs a boat with a working battery. Once installed on your boat, you can monitor and control your boat from anywhere you have internet
More informationeportfolio Support Guide
eportfolio Support Guide D2L Services West Chester University of Pennsylvania www.wcupa.edu/d2l 610-436-3350, option 2 Anderson Hall, room 20 d2l@wcupa.edu v10.3 September 2014 1 CONTENTS EPortfolio Basics
More informationTechniques for Content Subscription Anonymity with Distributed Brokers
Techniques for Content Subscription Anonymity with Distributed Brokers Sasu Tarkoma, University of Helsinki Christian Prehofer, Fraunhofer Munich 22.9.2010 Contents Introduction Content-based routing and
More informationContext-aware Services for UMTS-Networks*
Context-aware Services for UMTS-Networks* * This project is partly financed by the government of Bavaria. Thomas Buchholz LMU München 1 Outline I. Properties of current context-aware architectures II.
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationBuilding a Person-Centric Mashup System. CommunityMashup: A Service Oriented Approach.
Building a Person-Centric Mashup System. CommunityMashup: A Service Oriented Approach. Peter Lachenmaier 1, Florian Ott 1, 1 Bundeswehr University Munich, Cooperation Systems Center Munich, Werner-Heisenberg-Weg
More informationComputing Technologies
Computing Technologies Computing CPU, Memory, Communication Ubiquitous everywhere indefinite number of times Not really possible or desirable more than in traditional computing so widespread that unnoticed
More informationTrust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University
Trust in the Internet of Things From Personal Experience to Global Reputation 1 Nguyen Truong PhD student, Liverpool John Moores University 2 Outline I. Background on Trust in Computer Science II. Overview
More informationFood Festival Network
Food Festival Network 1. Project Charter a. Business Opportunity Create a web property that will be a directory of Nationwide (USA) Food Festivals that will allow users to search for festivals, share them
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationManaging Update Conflicts in Bayou. Lucy Youxuan Jiang, Hiwot Tadese Kassa
Managing Update Conflicts in Bayou Lucy Youxuan Jiang, Hiwot Tadese Kassa Outline! Background + Motivation! Bayou Model Dependency checking for conflict detection Merge procedures for conflict resolution
More informationAnalyzing Spotify s Business
University of California, Berkeley INFO 234 Information Technology Economics, Policy, and Strategy Analyzing Spotify s Business Author: Snaheth Thumathy Supervisors: John Chuang Andy Brooks May 8, 2017
More informationTeaching and Learning with Technology Seminar
Teaching and Learning with Technology Seminar Media Guide #1 - Web Based Resources for Training Project 4 Overview By: Jennifer Maddrell Submitted: December 3, 2006 For: Professor Boling Indiana University
More information1 What-is-anopen-platform/
universaal IOT a Technical Overview Topics Semantic Discovery & Interoperability Service Broker & Orchestrator Context Broker, Context History Entrepôt, & Semantic Reasoning Human-Environment Interaction
More informationContext-Aware Services
Chapter 6 Context-Aware Services 6.1 Rationale and Motivation As the user becomes swamped with more and more information, filtering this information becomes ever more important. This is especially true
More informationHOPE Project AAL Smart Home for Elderly People
1.1.1.1.1 HOPE Project AAL-2008-1-099 Smart Home for Elderly People D10 User Interface Mockup Report Version: 1 1.0 Report Preparation Date: 28.02.2010 Classification: Partner Responsible: Restricted I2S
More informationIMMS-CELL-GSM. Cellular Communications Kit. Installation Instructions
IMMS-CELL-GSM Cellular Communications Kit Installation Instructions TABLE OF CONTENTS... Before You Install... 1 Operating Systems: GSM, and GSM-E...2 Circuit Switched Data (CSD)...2 Installation Notes...
More informationCollaborate App for Android Tablets
The AT&T Collaborate service provides the Collaborate app to help you manage calls and conferences on your Android tablet on the go. The Collaborate app for Android tablets provides these communication
More informationPeer-to-Peer Technology An Enabler for Command and Control Information Systems in a Network Based Defence?
Peer-to-Peer Technology An Enabler for Command and Control Information Systems in a Network Based Defence? 9th ICCRTS September 14-16 2004 Copenhagen Tommy Gagnes FFI (Norwegian Defence Research Establishment)
More informationJMWeb Online Help
Table Of Contents Contents Welcome to Jabber Messenger for the Web... 3 What do you want to do?... 3 Adding Contacts... 4 Chatting with Contacts... 5 What is Presence?... 7 Presence types... 7 Your presence...
More informationSecure European Common Information Space for the Interoperability of First Responders and Police Authorities
Secure European Common Information Space for the Interoperability of First Responders and Police Authorities 1 Consortium Start date: July 1st, 2014 Project Duration: 36 months Consortium: 16 partners
More informationInfor Xtreme Communities
Infor Xtreme Communities Quick User Guide Revision No. 1 18 APRIL 2016 Copyright 2016 Infor. All rights reserved. The word and design marks set forth herein are trademarks and/or registered trademarks
More informationETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09
ETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09 ETNA 215462 STREP FP7-ICT-2007 The Network of the Future 1 Motivation Inter carrier (inter Domain) service provisioning automation is gaining
More informationAdaptive Spatiotemporal Node Selection in Dynamic Networks
Adaptive Spatiotemporal Node Selection in Dynamic Networks Pradip Hari, John B. P. McCabe, Jonathan Banafato, Marcus Henry, Ulrich Kremer, Dept. of Computer Science, Rutgers University Kevin Ko, Emmanouil
More informationMARKETING: TOP TIPS TO EXPAND YOUR DATABASE FULL SERVICE E-COMMERCE AGENCY
EMAIL MARKETING: TOP TIPS TO EXPAND YOUR EMAIL DATABASE FULL SERVICE E-COMMERCE AGENCY Best practice e-commerce websites since 1997. We design, build, host, support & update websites. Email marketing Email
More informationOpen Exchange Policy
23-01-2014 Open Exchange Policy Date of Issue: 23 Jan 2014 Document Code: GN3PLUS13-1439-12 Authors: DANTE Product Management Description: Outlines the purpose and governance of the GÉANT Open Exchange
More informationNorth America Requirements for Certified TRE Providers TRE GLOBAL CERTIFICATION TRAINING PROGRAM
North America Requirements for Certified TRE Providers TRE GLOBAL CERTIFICATION TRAINING PROGRAM (NA-GCTP) Outlined below are the certification requirements to become a Certified TRE Provider in Canada
More informationMiming navigation pages with a personal remote control device for the aged
Miming navigation pages with a personal remote control device for the aged Maria Teresa SEGARRA 1 and André THEPAUT Institut Telecom Telecom Bretagne Technopôle Brest-Iroise CS 83818 Brest Cedex 3 - France
More informationCOSMOTE Mobile Voice Mail Activation from your mobile phone, when the mobile phone is switched off or out of coverage, and at the same time:
COSMOTE Mobile Voice Mail instructions The COSMOTE Mobile Voice Mail Service can store up to 30 messages of a maximum 3- minute duration each. When you have voice mail, a special indication appears on
More informationHTNG Web Services Product Specification. Version 2014A
HTNG Web Services Product Specification Version 2014A About HTNG Hotel Technology Next Generation (HTNG) is a non-profit association with a mission to foster, through collaboration and partnership, the
More informationRenovate your studio Maximize your investment!
Renovate your studio Maximize your investment! "Our members love Spivi! Spivi helps us get new members as it's a renovator to indoor cycling. As a result of the abovementioned reasons spinning classes
More informationHow to Build Your Course in Moodle
How to Build Your Course in Moodle This tutorial will show you the basic functions of how to add and edit content to build your course in Moodle. To add or alter activities or resources, you will need
More informationRui Campos, Carlos Pinho, Manuel Ricardo and José Ruela
Dynamic and Automatic Interworking between Personal Area Networks using Rui Campos, Carlos Pinho, Manuel Ricardo and José Ruela Outline 1. Introduction 2. Ambient Network and Network 3. Case Study Interworking
More informationM POWER. challenges and opportunities. In the end, it's not the years in your life that count. It's the life in your years." - Abraham Lincoln
M POWER challenges and opportunities In the end, it's not the years in your life that count. It's the life in your years." - Abraham Lincoln Sten Hanke Project Manager Austrian Institute of Technology
More informationVirtual presence - Research and Development Issues
Virtual presence - Research and Development Issues Spending time in Virtual Spaces The social and human experience self Frank Scenery and content examples Infrastructure requirements End user equipment
More informationInstallation and User Guide. fring version For iphone / ipod touch 2.x/3.x.x
Installation and User Guide fring version 3.0.0.4 For iphone / ipod touch 2.x/3.x.x 1 Table of Contents Introduction... 2 About fring... 3 System Requirements... 4 Registering to fring... 5 Login Procedure...
More informationMobile Identity Management
Mobile Identity Management Outline Ideas Motivation Architecture Implementation notes Discussion Motivation 1 The mobile phone has become a highly personal device: Phonebook E-mail Music, videos Landmarks
More informationNote-Taking Guide. Numbered t. Colored t. Insert i. Insert t. Insert a l. L s. Paint f. Course: Google s Document App Episode: Word Processing Basics
Course: Googles Document App Episode: Word Processing Basics Note-Taking Guide Make sure you are logged into Google Drive. Click on the red box with the word Create in the upper-left corner and select
More informationPrivacy Policy. Personal Data collected for the following purposes and using the following services:
Privacy Policy This Application collects some Personal Data from its Users. Summary Personal Data collected for the following purposes and using the following services: Access to third party services'
More informationLesson 16 Prototyping Online Components Weather Web APIs for usage in a Phone
Lesson 16 Prototyping Online Components Weather Web APIs for usage in a Phone 1 Weather Application UIs, APIs and web API interactions Number of APIs can be mashed to get a the desired Web Application
More informationVenture Services Seeheim
Smart Home Day Venture Services Seeheim 20.05.2017 Dr. Gunter Kuechler (CEO) Patrick Gottschaemmer (CTO) 2017 AHS GmbH / VSS GmbH Patrick Gottschaemmer 1 about founded in 2014 (by Dr. Gunter Kuechler)
More informationFast Contextual Preference Scoring of Database Tuples
Fast Contextual Preference Scoring of Database Tuples Kostas Stefanidis Department of Computer Science, University of Ioannina, Greece Joint work with Evaggelia Pitoura http://dmod.cs.uoi.gr 2 Motivation
More informationOverview of this Integration
CHAPTER 1 June 18, 2013 Basic Federated Network, page 1-1 About SIP Federation with AOL, page 1-4 About Intercluster and Multi-node Deployments, page 1-5 High Availability for SIP Federation, page 1-7
More informationBill Wear. VirtualVault Product Manager. Internet Banking Case Study
Bill Wear VirtualVault Product Manager Internet Banking Case Study Business Problem? A Swedish bank wants an Internet Branch. Make the security barrier high enough...... but not TOO high. And by the way,
More informationELEC6910Q Analytics and Systems for Social Media and Big Data Applications Lecture 4. Prof. James She
ELEC6910Q Analytics and Systems for Social Media and Big Data Applications Lecture 4 Prof. James She james.she@ust.hk 1 Selected Works of Activity 4 2 Selected Works of Activity 4 3 Last lecture 4 Mid-term
More informationPersonal Data collected for the following purposes and using the following services: Personal Data: address, first name and last name
Privacy Policy This Application collects some Personal Data from its Users. POLICY SUMMARY Personal Data collected for the following purposes and using the following services: Contacting the User Contact
More informationPRIVACY NOTICE INFORMATION COLLECTED
PRIVACY NOTICE Iberian Property is responsible for the sites available at the domain iberian.property, as well as for its subdomains (collectively named websites ). Iberian Property takes the privacy and
More informationDiscussion Board. How to Access the Discussion Board
Blackboard Help Discussion Board About Forums About Threads Reply to Discussion Posts Search and Collect Posts Manage Discussions View Discussion Grades Moderate Forums Discussion FAQs 1 Discussion Board
More informationCustomize the ReCharge Customer Portal. with the Theme Engine
Customize the ReCharge Customer Portal with the Theme Engine Table of Contents 01. Why Customize the Customer Portal?... 3 02. Theme Engine at a Glance... 6 03. Example Customizations... 10 04. How to
More informationEssential Component 3:
Essential Component 3: Form Initial Student View EC 3: Form Initial Student View Consider how the course looks when students log in for the first time. Is the course professional looking, well-organized,
More informationPilot: Collaborative Glossary Platform
Pilot: Collaborative Glossary Platform CI Context Viewpoint 1. As-Is Workflow Model Workflow Name: Term / Definition Collection Domain Context: Typically each group / community has its own list of terms
More informationS T R U C T U R A L M O D E L I N G ( M O D E L I N G A S Y S T E M ' S L O G I C A L S T R U C T U R E U S I N G C L A S S E S A N D C L A S S D I A
S T R U C T U R A L M O D E L I N G ( M O D E L I N G A S Y S T E M ' S L O G I C A L S T R U C T U R E U S I N G C L A S S E S A N D C L A S S D I A G R A M S ) WHAT IS CLASS DIAGRAM? A class diagram
More informationForescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0
Forescout Version 2.0 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More information55193A: INTRODUCTION TO SHAREPOINT 2016 FOR COLLABORATION AND DOCUMENT MANAGEMENT
ABOUT THIS COURSE This one day class is designed for SharePoint team members and end users who need to know how to use the team collaboration, document management and social features of Microsoft SharePoint
More informationCountering Hidden-Action Attacks on Networked Systems
Countering on Networked Systems University of Cambridge Workshop on the Economics of Information Security, 2005 Outline Motivation 1 Motivation 2 3 4 Motivation Asymmetric information inspires a class
More informationHow likely are you to recommend venue name to a friend?
NPS SURVEY NPS stands for Net Promoter Score, this is an index ranging from -100 to 100 that measures the willingness of customers to recommend a company s product or services to others. As the questions
More informationData Privacy Policy Updated: Q2-2018
Data Privacy Policy Updated: Q2-2018 Contents 1. Privacy Notice Overview 2. Information Collection, Use and Sharing 3. External Website Links and Third Parties 4. Security 5. Your Access To and Control
More informationDistributed Systems. Chapter 1: Introduction
Distributed Systems (3rd Edition) Chapter 1: Introduction Version: February 25, 2017 2/56 Introduction: What is a distributed system? Distributed System Definition A distributed system is a collection
More informationimail Frequently Asked Questions (FAQs) 20 June 2014 Version 2.1
imail Frequently Asked Questions (FAQs) 20 June 2014 Version 2.1 Owner: Cynthia Tan IT Services Table of Contents GENERAL FAQS... 1 1. How to access to Sunway imail account?... 1 2. I can t login to my
More informationSmart UC DESKTOP USER GUIDE VOCUS.COM.AU
Smart UC DESKTOP USER GUIDE VOCUS.COM.AU Document Revision History Table of Contents 1 About SMART UC for Desktop... 4 2 Getting Started... 5 1.1 Installation... 5 1.2 Sign In... 6 1.3 Main Window... 7
More informationQuick Start: Use instant messaging and presence
Quick Start: Use instant messaging and presence This Quick Start describes the basics for communicating by using Microsoft Lync 2010 communications software. It explains how to use Lync 2010 to easily
More informationPerfectView Privacy Statement
PerfectView Privacy Statement Who are we? Over the last 30 years. PerfectView has built up a leading position as a producer and supplier of CRM software. Since 2010, we have been supplying PerfectView
More informationChronos Fitness, Inc. dba Chronos Wearables, 1347 Green St. San Francisco CA 94109,
Privacy Policy Of Chronos Wearables This Application collects some Personal Data from its Users. Data Controller and Owner Chronos Fitness, Inc. dba Chronos Wearables, 1347 Green St. San Francisco CA 94109,
More informationGUI: GPS-Less Traffic Congestion Avoidance in Urban Area with Inter-Vehicular Communication
GUI: GPS-Less Traffic Congestion Avoidance in Urban Area with Inter-Vehicular Communication Zhen Jiang, Jie Wu, Paul Sabatino CIS Dept., Temple University CS Dept., West Chester Unviersity Information
More informationWebsite Designs Australia
Proudly Brought To You By: Website Designs Australia Contents Disclaimer... 4 Why Your Local Business Needs Google Plus... 5 1 How Google Plus Can Improve Your Search Engine Rankings... 6 1. Google Search
More informationAdaptive Middleware for Real-Time Software. Louise Avila CIS November 2, 2005
Adaptive Middleware for Real-Time Software Louise Avila CIS 700-02 November 2, 2005 Topic An Adaptive Middleware for Context-Sensitive Communications for Real-Time Applications in Ubiquitous Computing
More informationCisco Service Control Traffic Optimization: Capacity Control Solution Guide, Release 3.6.x
CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Traffic Optimization: Capacity Control Solution Guide, Release 3.6.x 1 Introduction and Toolset Overview 2 Configuring the Solution 3 Obtaining
More informationHOW TO USE COMMUNICATION TOOLS
Developmental Math MINDTAP MATH FOUNDATIONS HOW TO USE COMMUNICATION TOOLS When MindTap Math Foundations was being developed, we spoke with students just like you to better understand the things they felt
More informationFoundation Learning as a progression route to. Apprenticeships. The Toolkit
Foundation Learning as a progression route to Apprenticeships The Toolkit Introduction Although Middlesbrough has a higher than average take up on Apprenticeship programmes, a significant number of 16
More informationSmart City, Internet of Things, Security and Privacy
Smart City, Internet of Things, Security and Privacy Peter Waher Abstract. This course contains a series of lectures and practical laboratory assignments spanning four days that provide the participants
More informationUnderstanding prototype fidelity What is Digital Prototyping? Introduction to various digital prototyping tools
HCI and Design Today Assignment 1 is graded Assignment 3 is posted Understanding prototype fidelity What is Digital Prototyping? Introduction to various digital prototyping tools Reminder: What is a prototype?
More informationPicture 1.1 Click PAGES in Control Panel
Add Interactivity to Your Website Interactivity can be a compelling and innovative way to engage your students and create experiences that cannot be replicated in other media. Weebly provides multiple
More informationMobile Peer-to-Peer Business Models T Network Services Business Models. Mikko Heikkinen
Mobile Peer-to-Peer Business Models T-109.4300 Network Services Business Models Mikko Heikkinen 26.03.2009 Outline Definitions What is peer-to-peer? What is mobile peer-to-peer? Motivation STOF and MP2P
More informationWhat is Facebook? By
What is Facebook? By www.digitalunite.com Facebook is probably the best known of the social networking sites. Created in 2004 by Mark Zuckerberg and his friends, originally as a way for students at Harvard
More informationChat Activity. Moodle: Collaborative Activities & Blocks. Creating Chats
Chat Activity The Moodle chat tool allows communication between instructors and students in real time. Unlike in discussion forums, which are a means for asynchronous communication, online chat sessions
More informationProject Transfer: Five Years Later ER&L 2012
Project Transfer: Five Years Later ER&L 2012 Nancy Beals (Wayne State University Libraries) Jennifer Bazeley (Miami University Library) Overview Context Journal Transfers and Consequences What and How
More informationPrivacy Policy. Overview:
Privacy Policy Dibs Technology, Inc., ( Dibs ) provides pricing and booking software to fitness studios. This Privacy Policy describes how we collect, use and protect information collected from customers
More information