CENTRIC 2015, The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services November 15 – 20, 2015 – Barcelona, Spain General page: http://www.iaria.org/conferences2015/CENTRIC15.html Call for Papers: http://www.iaria.org/conferences2015/CfPCENTRIC15.html Submission page: http://www.iaria.org/conferences2015/SubmitCENTRIC15.html Contributions: – regular papers [in the proceedings, digital library] – short papers (work in progress) [in the proceedings, digital library] – […]
Posts Tagged ‘Risks of user-centered design’
CENTRIC 2015, The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
November 8th, 2014 CI2S Enterprise Content Admin
Posted in Congress, Country, Spain Tags: Anonymity and pseudonymity, Attacks against de-identified data, Building user-centric systems, Centric views, Consent-based privacy disclosure, Contextual user information facets, Data anonymity, Disclosure control techniques, I-centric versus We-centric, Information loss assessment, Information Retrieval, Innovation and user-centered design, Innovative user Interfaces, Legal aspects in privacy and anonymity, New types of human-computer-interactions, Personalized seeking and personalized sharing, Privacy and anonymity, Privacy and anonymity in specialized applications /healthcare. databases, Privacy and anonymity ontology, Privacy preserving data and text mining, Privacy technologies, Private digital assets, Research on user competencies and requirements, Risk assessment for shared information, Risks of user-centered design, social networks, User empowerment: awareness and control, User information access behavior, User location anonymity techniques, User-centered design in smart environments, User-centered methods for development and maintenance, User-centered research methods, User-centric and critical time-centric applications and services, User-centric business models, User-centric data aggregation, User-centric data mining, User-centric in service-centric systems, User-centric professional attackers, User-centric requirements in network-centric approaches, User-centric trust models, User-oriented ontology Comments Off on CENTRIC 2015, The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services