Search for dissertations about: "Control of personal data"
Showing result 1 - 5 of 168 swedish dissertations containing the words Control of personal data.
-
1. Shadows of Cavernous Shades: Charting the Chiaroscuro of Realistic Computing
Abstract : During the early 1990s, a novel style of programming often referred to as component-oriented programming quickly grew popular as the state-of-the-art in graphical user interface and client/server development on Windows-based personal computers, largely in competition with object-oriented programming, a partly similar, partly different programming paradigm, with which component-orientation is often compared, combined, and confused. Also during the 1990s, the world-wide web spread its arachnoid gossamer over the globe with deep-ranging ramifications for software component technology. READ MORE
-
2. The Lord of Their Data Under the GDPR? : Empowering Users Through Usable Transparency, Intervenability, and Consent
Abstract : The challenges imposed by the ever-growing online data processing make it difficult for people to control their data, which inevitably imperils the privacy of their personal information and making informed decisions. Thus, there is an increasing need for different societal, technological, and legal solutions that empower users to take control of their data. READ MORE
-
3. Personal service environments : Openness and user control in user-service interaction
Abstract : This thesis describes my work with making the whole experience of using electronic services more pleasant and practical. More and more people use electronic services in their daily life — be it services for communicating with colleagues or family members, web-based bookstores, or network-based games for entertainment. READ MORE
-
4. Nonconformity Measures and Ensemble Strategies : An Analysis of Conformal Predictor Efficiency and Validity
Abstract : Conformal predictors are a family of predictive models that associate with each of their predictions a measure of confidence, enabling them to provide quantitative information about their own trustworthiness. In risk-laden machine learning applications, where bad predictions may lead to economic loss, personal injury, or worse, such inherent quality control appears highly beneficial, if not required. READ MORE
-
5. Model-based Approaches to Privacy Compliance
Abstract : In the last decade, information technologies have been developing dramatically, and therefore data harvested via the Internet is growing rapidly. This technological change has a negative impact on privacy due to the sensitivity of the data collected and shared without convenient control or monitoring. READ MORE