Personal data management with the Databox: what’s inside the box?
We are all increasingly the subjects of data collection and processing systems that use data generated both about and by us to provide and optimise a wide range of services. Means for others to collect and process data that concerns each of us – often referred to possessively as “your data” – are on...
| Main Authors: | Mortier, Richard, Zhao, Jianxin, Crowcroft, Jon, Qi Li, Liang Wang, Haddadi, Hamed, Amar, Yousef, Crabtree, Andy, Colley, James, Lodge, Tom, Brown, Anthony, McAuley, Derek, Greenhalgh, Chris |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2016
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/38641/ |
Similar Items
Personal data nanagement with the Databox: what’s inside the box?
by: Mortier, Richard, et al.
Published: (2016)
by: Mortier, Richard, et al.
Published: (2016)
Enabling the new economic actor: data protection, the digital economy, and the databox
by: Crabtree, Andy, et al.
Published: (2016)
by: Crabtree, Andy, et al.
Published: (2016)
Building accountability into the Internet of Things: the
IoT Databox model
by: Crabtree, Andy, et al.
Published: (2018)
by: Crabtree, Andy, et al.
Published: (2018)
Accountable Internet of things?: outline of the IoT Databox model
by: Crabtree, Andy, et al.
Published: (2017)
by: Crabtree, Andy, et al.
Published: (2017)
Valorising the IoT Databox: creating value for everyone
by: Perera, Charith, et al.
Published: (2016)
by: Perera, Charith, et al.
Published: (2016)
Human-data interaction
by: Mortier, Richard, et al.
Published: (2016)
by: Mortier, Richard, et al.
Published: (2016)
Edge computing techniques for classification based multi-task incremental learning
by: Dube, Swaraj Sunilkumar
Published: (2023)
by: Dube, Swaraj Sunilkumar
Published: (2023)
Special theme on privacy and the Internet of Things
by: Chamberlain, Alan, et al.
Published: (2018)
by: Chamberlain, Alan, et al.
Published: (2018)
Demonstrating a novel configuration of FPSE prototype working at medium temperature range
by: Ghozzi, Salem, et al.
Published: (2016)
by: Ghozzi, Salem, et al.
Published: (2016)
Ant litter fauna of forest, forest edges and adjacentgrassland in the Atlantic rain forest region of Bahia, Brazil
by: Majer, Jonathan, et al.
Published: (1997)
by: Majer, Jonathan, et al.
Published: (1997)
3D diffraction imaging of linear features and its application to seismic monitoring
by: Alonaizi, Faisal, et al.
Published: (2013)
by: Alonaizi, Faisal, et al.
Published: (2013)
A comparative study of density functional and density functional tight binding calculations of defects in graphene
by: Zobelli, A., et al.
Published: (2012)
by: Zobelli, A., et al.
Published: (2012)
Wild interdisciplinarity: ethnography and computer science
by: Goulden, Murray, et al.
Published: (2016)
by: Goulden, Murray, et al.
Published: (2016)
A feasibility study of an in-the-wild experimental public access WiFi network
by: Sathiaseelan, Arjuna, et al.
Published: (2014)
by: Sathiaseelan, Arjuna, et al.
Published: (2014)
Explicating the challenges of providing novel media experiences driven by user personal data
by: Sailaja, Neelima, et al.
Published: (2018)
by: Sailaja, Neelima, et al.
Published: (2018)
Motion Estimation in Flotation Froth Images Based on Edge Detection and Mutual Information
by: Amankwah, Anthony, et al.
Published: (2012)
by: Amankwah, Anthony, et al.
Published: (2012)
Creativity Bento Box: a physical resource pack to support interaction in virtual space
by: Schnädelbach, Holger, et al.
Published: (2015)
by: Schnädelbach, Holger, et al.
Published: (2015)
Inter-social-networking: accounting for multiple identities
by: Price, Dominic, et al.
Published: (2015)
by: Price, Dominic, et al.
Published: (2015)
Matchings, factors and cycles in graphs
by: Philpotts, Adam Richard
Published: (2008)
by: Philpotts, Adam Richard
Published: (2008)
House rules: the collaborative nature of policy in domestic networks
by: Crabtree, Andy, et al.
Published: (2015)
by: Crabtree, Andy, et al.
Published: (2015)
Neural network edge detection and skin lesions image segmentation methods: analysis and evaluation
by: Rajab, Maher I.
Published: (2003)
by: Rajab, Maher I.
Published: (2003)
Edge detection of the optic disc in retinal images based on identification of a round shape
by: Chaichana, T., et al.
Published: (2008)
by: Chaichana, T., et al.
Published: (2008)
Avoiding the internet of insecure industrial things
by: Urquhart, Lachlan, et al.
Published: (2018)
by: Urquhart, Lachlan, et al.
Published: (2018)
Relationship between tinnitus pitch and edge of hearing loss in individuals with a narrow tinnitus bandwidth
by: Sereda, Magdalena, et al.
Published: (2015)
by: Sereda, Magdalena, et al.
Published: (2015)
Small fish in a big pond: an architectural approach to users privacy, rights and security in the age of big data
by: Angelopoulos, Spyros, et al.
Published: (2016)
by: Angelopoulos, Spyros, et al.
Published: (2016)
Human data interaction: historical lessons from social studies and CSCW
by: Crabtree, Andy, et al.
Published: (2015)
by: Crabtree, Andy, et al.
Published: (2015)
Cue combination of colour and luminance in edge detection
by: Sharman, Rebecca J.
Published: (2014)
by: Sharman, Rebecca J.
Published: (2014)
Microwave-induced activation of additional active edge sites on the MoS₂ surface for enhanced Hgᴼ capture
by: Zhao, Haitao, et al.
Published: (2017)
by: Zhao, Haitao, et al.
Published: (2017)
Learning from the veg box: designing unpredictability in agency delegation
by: Verame, Jhim Kiel M., et al.
Published: (2018)
by: Verame, Jhim Kiel M., et al.
Published: (2018)
"This has to be the cats": personal data legibility in networked sensing systems
by: Tolmie, Peter, et al.
Published: (2016)
by: Tolmie, Peter, et al.
Published: (2016)
Bayesian edge-detection in image processing
by: Stephens, David A.
Published: (1990)
by: Stephens, David A.
Published: (1990)
Electric field strengths and ion trajectories in sharp-edge field ionization sources
by: Brailsford, David F.
Published: (1970)
by: Brailsford, David F.
Published: (1970)
Effects of Image Postprocessing in Digital Radiography to Detect Wooden, Soft Tissue Foreign Bodies
by: Kleinfelder, Thomas R, et al.
Published: (2022)
by: Kleinfelder, Thomas R, et al.
Published: (2022)
Maximizing bandwidth using disjoint paths
by: Loh, R., et al.
Published: (2010)
by: Loh, R., et al.
Published: (2010)
Living near the edge: how extreme outcomes and their neighbours drive risky choice
by: Ludvig, Elliot A., et al.
Published: (2018)
by: Ludvig, Elliot A., et al.
Published: (2018)
Reputation aware obfuscation for mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2015)
by: Radenkovic, Milena, et al.
Published: (2015)
Cross-system recommendation: user-modelling via
social media versus self-declared preferences
by: Alanazi, Sultan, et al.
Published: (2016)
by: Alanazi, Sultan, et al.
Published: (2016)
Realising the right to data portability for the domestic Internet of Things
by: Urquhart, Lachlan, et al.
Published: (2017)
by: Urquhart, Lachlan, et al.
Published: (2017)
From privacy impact assessment to Social Impact Assessment
by: Edwards, Lilian, et al.
Published: (2016)
by: Edwards, Lilian, et al.
Published: (2016)
Data work: how energy advisors and clients make IoT data accountable
by: Fischer, Joel E., et al.
Published: (2017)
by: Fischer, Joel E., et al.
Published: (2017)
Similar Items
-
Personal data nanagement with the Databox: what’s inside the box?
by: Mortier, Richard, et al.
Published: (2016) -
Enabling the new economic actor: data protection, the digital economy, and the databox
by: Crabtree, Andy, et al.
Published: (2016) -
Building accountability into the Internet of Things: the
IoT Databox model
by: Crabtree, Andy, et al.
Published: (2018) -
Accountable Internet of things?: outline of the IoT Databox model
by: Crabtree, Andy, et al.
Published: (2017) -
Valorising the IoT Databox: creating value for everyone
by: Perera, Charith, et al.
Published: (2016)