Consumer protection

View this topic in
Consumer protection laws designed to ensure fair trade competition and the free flow of truthful information in the marketplace. The laws are designed to prevent businesses that engage in fraud or specified unfair practices from gaining an advantage over competitors and may provide additional protection for the weak and those unable to take care of themselves. (Wikipedia.org)






Conferences related to Consumer protection

Back to Top

2018 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Conference and Exposition covering all aspects of Transmission and Distribuiton


2017 10th International Symposium on Computational Intelligence and Design (ISCID)

Computational Intelligence techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models. The application of computational intelligence techniques into industrial design, interactive design, media design, and engineering design are also within the scope.

  • 2016 9th International Symposium on Computational Intelligence and Design (ISCID)

    Computational Intelligence techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models.

  • 2015 8th International Symposium on Computational Intelligence and Design (ISCID)

    Computational Intelligence techniques typically include Fuzzy Logic, Evolutionary Computation,Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems andother similar computational models.

  • 2014 7th International Symposium on Computational Intelligence and Design (ISCID)

    Computational Intelligence techniques typically include Fuzzy Logic, Evolutionary Computation,Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems andother similar computational models.

  • 2013 6th International Symposium on Computational Intelligence and Design (ISCID)

    Computational Intelligence techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models.

  • 2012 5th International Symposium on Computational Intelligence and Design (ISCID)

    Computational Intelligence techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models.

  • 2011 4th International Symposium on Computational Intelligence and Design (ISCID)

    Computational Intelligence techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models. Computational Intelligence constitutes an umbrella of techniques, has proven to be flexible in decision making in dynamic environment.

  • 2010 3rd International Symposium on Computational Intelligence and Design (ISCID)

    ISCID 2010 will be held at Hangzhou, China in 29-31, October 2010. It provides researchers and practitioners interested in new information technologies an opportunity to highlight innovative research directions, novel applications, and a growing number of relationships between rough sets and such are as computational intelligence, knowledge discovery and design.

  • 2009 2nd International Symposium on Computational Intelligence and Design (ISCID)

    This symposium provide researchers and practitioners interested in new information technologies an opportunity to highlight innovative research directions, novel applications, and a growing number of relationships between rough sets and such areas as computational intelligence, knowledge discovery and data mining, non-conventional models of computation and design.

  • 2008 International Symposium on Computational Intelligence and Design (ISCID)

    computational intelligence, knowledge discovery and data mining, intelligent information systems, web mining, synthesis and analysis of complex objects , non-conventional models of computation and Industrial Design.


2017 12th International Forum on Strategic Technology (IFOST)

New materials and nanotechnologies , Information and communication technologies , Information and communication technologies , Power engineering and electric power electronics , etc


2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2017 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2017 18th International Conference on Electronic Packaging Technology (ICEPT)

The conference will exchange the latest developments in the field of electronic packaging technology through exhibitions, special lectures, special reports, thematic forums, club reports, posters and other forms of experience


More Conferences

Periodicals related to Consumer protection

Back to Top

Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Design & Test of Computers, IEEE

IEEE Design & Test of Computers offers original works describing the methods used to design and test electronic product hardware and supportive software. The magazine focuses on current and near-future practice, and includes tutorials, how-to articles, and real-world case studies. Topics include IC/module design, low-power design, electronic design automation, design/test verification, practical technology, and standards. IEEE Design & Test of ...


More Periodicals

Most published Xplore authors for Consumer protection

Back to Top

Xplore Articles related to Consumer protection

Back to Top

Genomic Privacy and the Rise of a New Research Community

Emiliano De Cristofaro IEEE Security & Privacy, 2014

Recent breakthroughs in whole genome sequencing (WGS) have laid the foundations to improve modern healthcare and attain a better understanding of genetic features, as well as their relation to diseases. The increased affordability of WGS prompts institutions worldwide to build large datasets of digitized genomes, often obtained from donors, and make them available for different research purposes. It also enables ...


Framework for pinpointing the point of compromise of e-mail addresses

J. R. Harrald; C. Hekimian; S. Shrestha 2004 IEEE International Engineering Management Conference (IEEE Cat. No.04CH37574), 2004

This paper introduces a method by which researchers can conduct a broad-scale investigation into the security of e-mail addresses in the hands of numerous of online entities such as e-businesses, online subscription services, and listserves. The information provided by this investigation technique can be employed by consumer protection organizations, in order to alert consumers about online services, which do not ...


XenoTrust: event-based distributed trust management

B. Dragovic; E. Kotsovinos; S. Hand; P. R. Pietzuch 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings., 2003

This paper describes XenoTrust, the trust management architecture used in the XenoServer Open Platform: a public infrastructure for wide-area computing, capable of hosting tasks that span the full spectrum of distributed paradigms. We suggest that using an event-based publish /subscribe methodology for the storage, retrieval and aggregation of reputation information can help exploiting asynchrony and simplicity, as well as improving ...


Does SaaS Backup Pass the Fitness-for-Purpose Test?

Roger Clarke IEEE Cloud Computing, 2015

Software-as-a-service (SaaS) providers have achieved dramatic take-up rates for their services. However, they are placing their businesses at risk through their inadequate attention to security issues. Nowhere is this more evident than in the area of backup and recovery. When assessed against users' needs for assured accessibility of the data that they entrust to the cloud, SaaS services are found ...


FCC: Oppressing the "Maker" or Helping to Make the World a Safer Place for All?

William Lumpkins IEEE Consumer Electronics Magazine, 2016

In many despotic futures as portrayed by overeager authors, governments on every continent try to suppress individual rights to thought, communication, and movement. Often we are told that the government has launched a new law or scheme to limit our individual rights or our ability to exercise free will. Although, as a libertarian, I can understand the fear that one ...


More Xplore Articles

Educational Resources on Consumer protection

Back to Top

eLearning

Genomic Privacy and the Rise of a New Research Community

Emiliano De Cristofaro IEEE Security & Privacy, 2014

Recent breakthroughs in whole genome sequencing (WGS) have laid the foundations to improve modern healthcare and attain a better understanding of genetic features, as well as their relation to diseases. The increased affordability of WGS prompts institutions worldwide to build large datasets of digitized genomes, often obtained from donors, and make them available for different research purposes. It also enables ...


Framework for pinpointing the point of compromise of e-mail addresses

J. R. Harrald; C. Hekimian; S. Shrestha 2004 IEEE International Engineering Management Conference (IEEE Cat. No.04CH37574), 2004

This paper introduces a method by which researchers can conduct a broad-scale investigation into the security of e-mail addresses in the hands of numerous of online entities such as e-businesses, online subscription services, and listserves. The information provided by this investigation technique can be employed by consumer protection organizations, in order to alert consumers about online services, which do not ...


XenoTrust: event-based distributed trust management

B. Dragovic; E. Kotsovinos; S. Hand; P. R. Pietzuch 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings., 2003

This paper describes XenoTrust, the trust management architecture used in the XenoServer Open Platform: a public infrastructure for wide-area computing, capable of hosting tasks that span the full spectrum of distributed paradigms. We suggest that using an event-based publish /subscribe methodology for the storage, retrieval and aggregation of reputation information can help exploiting asynchrony and simplicity, as well as improving ...


Does SaaS Backup Pass the Fitness-for-Purpose Test?

Roger Clarke IEEE Cloud Computing, 2015

Software-as-a-service (SaaS) providers have achieved dramatic take-up rates for their services. However, they are placing their businesses at risk through their inadequate attention to security issues. Nowhere is this more evident than in the area of backup and recovery. When assessed against users' needs for assured accessibility of the data that they entrust to the cloud, SaaS services are found ...


FCC: Oppressing the "Maker" or Helping to Make the World a Safer Place for All?

William Lumpkins IEEE Consumer Electronics Magazine, 2016

In many despotic futures as portrayed by overeager authors, governments on every continent try to suppress individual rights to thought, communication, and movement. Often we are told that the government has launched a new law or scheme to limit our individual rights or our ability to exercise free will. Although, as a libertarian, I can understand the fear that one ...


More eLearning Resources

IEEE-USA E-Books



Standards related to Consumer protection

Back to Top

No standards are currently tagged "Consumer protection"


Jobs related to Consumer protection

Back to Top