INVITATION: ================= Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results to CENTRIC 2015. The submission deadline is extended to June 29, 2015. Authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals: http://www.iariajournals.org ================= […]
Posts Tagged ‘User-centric trust models’
CENTRIC 2015 | Call for Papers
June 10th, 2015 CI2S Enterprise Content Admin
Posted in Congress, Country, Spain Tags: Contextual user information facets, Personalized seeking and personalized sharing, User centricity: I-centric versus We-centric, User empowerment: awareness and control, User information access behavior, User-centric and critical time-centric applications and services, User-centric business models, User-centric data aggregation, User-centric data mining, User-centric in service-centric systems, User-centric professional attackers, User-centric requirements in network-centric approaches, User-centric trust models, User-oriented ontology Comments Off on CENTRIC 2015 | Call for Papers
CENTRIC 2015, The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
November 8th, 2014 CI2S Enterprise Content Admin
CENTRIC 2015, The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services November 15 – 20, 2015 – Barcelona, Spain General page: http://www.iaria.org/conferences2015/CENTRIC15.html Call for Papers: http://www.iaria.org/conferences2015/CfPCENTRIC15.html Submission page: http://www.iaria.org/conferences2015/SubmitCENTRIC15.html Contributions: – regular papers [in the proceedings, digital library] – short papers (work in progress) [in the proceedings, digital library] – […]
Posted in Congress, Country, Spain Tags: Anonymity and pseudonymity, Attacks against de-identified data, Building user-centric systems, Centric views, Consent-based privacy disclosure, Contextual user information facets, Data anonymity, Disclosure control techniques, I-centric versus We-centric, Information loss assessment, Information Retrieval, Innovation and user-centered design, Innovative user Interfaces, Legal aspects in privacy and anonymity, New types of human-computer-interactions, Personalized seeking and personalized sharing, Privacy and anonymity, Privacy and anonymity in specialized applications /healthcare. databases, Privacy and anonymity ontology, Privacy preserving data and text mining, Privacy technologies, Private digital assets, Research on user competencies and requirements, Risk assessment for shared information, Risks of user-centered design, social networks, User empowerment: awareness and control, User information access behavior, User location anonymity techniques, User-centered design in smart environments, User-centered methods for development and maintenance, User-centered research methods, User-centric and critical time-centric applications and services, User-centric business models, User-centric data aggregation, User-centric data mining, User-centric in service-centric systems, User-centric professional attackers, User-centric requirements in network-centric approaches, User-centric trust models, User-oriented ontology Comments Off on CENTRIC 2015, The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services