258 resultados para privacy protection
Resumo:
"Combining facets of health physics with medicine, An Introduction to Radiation Protection in Medicine covers the background of the subject and the medical situations where radiation is the tool to diagnose or treat human disease. Encouraging newcomers to the field to properly and efficiently function in a versatile and evolving work setting, it familiarizes them with the particular problems faced during the application of ionizing radiation in medicine. The text builds a fundamental knowledge base before providing practical descriptions of radiation safety in medicine. It covers basic issues related to radiation protection, including the physical science behind radiation protection and the radiobiological basis of radiation protection. The text also presents operational and managerial tools for organizing radiation safety in a medical workplace. Subsequent chapters form the core of the book, focusing on the practice of radiation protection in different medical disciplines. They explore a range of individual uses of ionizing radiation in various branches of medicine, including radiology, nuclear medicine, external beam radiotherapy, and brachytherapy. With contributions from experienced practicing physicists, this book provides essential information about dealing with radiation safety in the rapidly shifting and diverse environment of medicine."--publisher website
Resumo:
In the developing digital economy, the notion of traditional attack on enterprises of national significance or interest has transcended into different modes of electronic attack, surpassing accepted traditional forms of physical attack upon a target. The terrorist attacks that took place in the United States on September 11, 2001 demonstrated the physical devastation that could occur if any nation were the target of a large-scale terrorist attack. Therefore, there is a need to protect criticalnational infrastructure and critical information infrastructure. In particular,this protection is crucial for the proper functioning of a modern society and for a government to fulfill one of its most important prerogatives – namely, the protection of its people. Computer networks have many benefits that governments, corporations, and individuals alike take advantage of in order to promote and perform their duties and roles. Today, there is almost complete dependence on private sector telecommunication infrastructures and the associated computer hardware and software systems.1 These infrastructures and systems even support government and defense activity.2 This Article discusses possible attacks on critical information infrastructures and the government reactions to these attacks.
Resumo:
1. Stream ecosystem health monitoring and reporting need to be developed in the context of an adaptive process that is clearly linked to identified values and objectives, is informed by rigorous science, guides management actions and is responsive to changing perceptions and values of stakeholders. To be effective, monitoring programmes also need to be underpinned by an understanding of the probable causal factors that influence the condition or health of important environmental assets and values. This is often difficult in stream and river ecosystems where multiple stressors, acting at different spatial and temporal scales, interact to affect water quality, biodiversity and ecosystem processes. 2. In this article, we describe the development of a freshwater monitoring programme in South East Queensland, Australia, and how this has been used to report on ecosystem health at a regional scale and to guide investments in catchment protection and rehabilitation. We also discuss some of the emerging science needs to identify the appropriate scale and spatial arrangement of rehabilitation to maximise river ecosystem health outcomes and, at the same time, derive other benefits downstream. 3. An objective process was used to identify potential indicators of stream ecosystem health and then test these across a known catchment land-use disturbance gradient. From the 75 indicators initially tested, 22 from five indicator groups (water quality, ecosystem metabolism, nutrient cycling, invertebrates and fish) responded strongly to the disturbance gradient, and 16 were subsequently recommended for inclusion in the monitoring programme. The freshwater monitoring programme was implemented in 2002, funded by local and State government authorities, and currently involves the assessment of over 120 sites, twice per year. This information, together with data from a similar programme on the region's estuarine and coastal marine waters, forms the basis of an annual report card that is presented in a public ceremony to local politicians and the broader community. 4. Several key lessons from the SEQ Healthy Waterways Programme are likely to be transferable to other regional programmes aimed at improving aquatic ecosystem health, including the importance of a shared common vision, the involvement of committed individuals, a cooperative approach, the need for defensible science and effective communication. 5. Thematic implications: this study highlights the use of conceptual models and objective testing of potential indicators against a known disturbance gradient to develop a freshwater ecosystem health monitoring programme that can diagnose the probable causes of degradation from multiple stressors and identify the appropriate spatial scale for rehabilitation or protection. This approach can lead to more targeted management investments in catchment protection and rehabilitation, greater public confidence that limited funds are being well spent and better outcomes for stream and river ecosystem health.
Resumo:
language (such as C++ and Java). The model used allows to insert watermarks on three “orthogonal” levels. For the first level, watermarks are injected into objects. The second level watermarking is used to select proper variants of the source code. The third level uses transition function that can be used to generate copies with different functionalities. Generic watermarking schemes were presented and their security discussed.
Resumo:
With the introduction of Check 21 law and the development of FSTC's echeck system, there has been an increasing usage of e-cheque conversions and acceptance among retailers, banks, and consumers. However, the current e-cheque system does not address issues concerning privacy, confidentiality, and traceability. We highlight the issues concerning the current electronic cheque system and provide a solution to overcome those drawbacks.
Resumo:
A novel platform consisting of a multilayered substrate, activated graphite-like carbon film, and dense forest of long, vertically-aligned multiwall carbon nanotubes grown by the chemical vapor deposition is designed, fabricated, and tested for covalent immobilization of enzymatic biocatalysts with the aim of protecting them from shear forces and microbial attacks present in bioreactors. The covalent bonding ensures enzyme retention in a flow, while the dense nanotube forest may serve as a protection of the enzymes from microbial attack without impeding the flow of reactants and products. This platform was demonstrated for the two reference enzymes, horseradish peroxidase and catalase, which were immobilized without degrading their biological activity. This combination of an activated carbon layer for an efficient immobilization of biocatalysts with a protective layer of inert carbon nanotubes could dramatically improve the efficiency and longevity of enzymatic bio-catalysis employed in a large variety of advanced biotechnological processes.
Resumo:
Internet and its widespread usage for multimedia document distribution put the copyright issue in a complete new setting. Multimedia documents, specifically those installed on a web page, are no longer passive as they typically include active applets. Copyright protection safeguards the intellectual property (IP) of multimedia documents, which are either sold or distributed free of charge. In this Chapter, the basic tools for copyright protection are discussed. First, general concepts and the vocabulary used in copyright protection of multimedia documents are discussed. Later, taxonomy of watermarking and fingerprinting techniques are studied. This part is concluded by a review of the literature dealing with IP security. The main part of the chapter discusses the generic watermarking scheme and illustrates it on three specific examples: collusion-free watermarking, spread spectrum watermarking, and software fingerprinting. Future trends and conclusions close the chapter.
Resumo:
This thesis has developed a new approach to trace virtual protection signals in Electrical substation networks. The main goal of the research was to analyse the contents of the virtual signals transferred, using third party software. In doing so, a comprehensive test was done on a distance protection relay, using non-conventional test equipment.
Resumo:
Nature exists. Humans exist. The behaviour of one impacts upon the other. The behaviour of humans is governed by the artificial contrivance described as the law. While the law can in this way control the behaviour of humans and the impact that human behaviour has on nature, the behaviour of nature is governed – if at all- in accordance with nature’s own sets of values which are quintessentially a matter for nature. The relationship between nature and humans may be the object of rules of law, but traditional legal doctrine dictates that humans but not nature are the subjects of the rules of law. The jurisprudence of the earth – it would appear – seeks to equalise in the eyes of the law nature as part of the global environment and humans as part of the global environment. How might this be done?
Resumo:
Information security and privacy in the healthcare domain is a complex and challenging problem for computer scientists, social scientists, law experts and policy makers. Appropriate healthcare provision requires specialized knowledge, is information intensive and much patient information is of a particularly sensitive nature. Electronic health record systems provide opportunities for information sharing which may enhance healthcare services, for both individuals and populations. However, appropriate information management measures are essential for privacy preservation...
Resumo:
Since the inception of the UN Convention on Biological Diversity (CBD) in 1992, little progress has been achieved in terms of involving the business community in protecting biological diversity worldwide. This article assesses the current activities of US Fortune 500 companies with respect to global biodiversity protection and the goals of the CBD. Data and information collected from 500 companies within eight major industrial sectors were further categorized at the company level to assess each company's involvement in global biodiversity protection. Our findings show that although companies' business profiles highly influence their decision-making process regarding the adoption of biodiversity protection policies and measures, their revenue profiles are less influential. We show that despite generating low revenues, companies in the utility sector are more active in the adoption of biodiversity protection policy than those in the financial sector, which generate high revenues. This study also demonstrates that companies must be convinced of the major effects of biodiversity loss on their bottom lines to be motivated to protect biological diversity. Companies' business and business-related risk profiles can also influence the adoption of biodiversity protection policies within the company. The study further demonstrates that a measurable biodiversity impact indicator is necessary for the companies to get seriously involved in the mitigation action. Finally, this study proposes a three-step biodiversity loss mitigation action framework that is drawn upon the assessment of the 500 companies that can contribute to develop an elaborative framework of business sector-specific mitigation plan. © 2013 Copyright Taylor and Francis Group, LLC.
Resumo:
This article assesses the extent to which the recently formulated Chinese concept of “Responsible Protection” (RP) offers a valuable contribution to the normative debate over R2P’s third pillar following the controversy over military intervention in Libya. While RP draws heavily on previous proposals such as the original 2001 ICISS report and Brazil’s “Responsibility while Protecting” (RwP), by amalgamating and re-packaging these earlier ideas in a more restrictive form the initiative represents a new and distinctive interpretation of R2P. However, some aspects of RP are framed too narrowly to provide workable guidelines for determining the permissibility of military intervention for civilian protection purposes, and should therefore be clarified and refined. Nevertheless, the Chinese proposal remains significant because it offers important insights into Beijing’s current stance on R2P. More broadly, China’s RP and Brazil’s RwP initiatives illustrate the growing willingness of rising, non-Western powers to assert their own normative preferences on sovereignty, intervention and global governance.
Resumo:
It is often said that Australia is a world leader in rates of copyright infringement for entertainment goods. In 2012, the hit television show, Game of Thrones, was the most downloaded television show over bitorrent, and estimates suggest that Australians accounted for a plurality of nearly 10% of the 3-4 million downloads each week. The season finale of 2013 was downloaded over a million times within 24 hours of its release, and again Australians were the largest block of illicit downloaders over BitTorrent, despite our relatively small population. This trend has led the former US Ambassador to Australia to implore Australians to stop 'stealing' digital content, and rightsholders to push for increasing sanctions on copyright infringers. The Australian Government is looking to respond by requiring Internet Service Providers to issue warnings and potentially punish consumers who are alleged by industry groups to have infringed copyright. This is the logical next step in deterring infringement, given that the operators of infringing networks (like The Pirate Bay, for example) are out of regulatory reach. This steady ratcheting up of the strength of copyright, however, comes at a significant cost to user privacy and autonomy, and while the decentralisation of enforcement reduces costs, it also reduces the due process safeguards provided by the judicial process. This article presents qualitative evidence that substantiates a common intuition: one of the major reasons that Australians seek out illicit downloads of content like Game of Thrones in such numbers is that it is more difficult to access legitimately in Australia. The geographically segmented way in which copyright is exploited at an international level has given rise to a ‘tyranny of digital distance’, where Australians have less access to copyright goods than consumers in other countries. Compared to consumers in the US and the EU, Australians pay more for digital goods, have less choice in distribution channels, are exposed to substantial delays in access, and are sometimes denied access completely. In this article we focus our analysis on premium film and television offerings, like Game of Thrones, and through semi-structured interviews, explore how choices in distribution impact on the willingness of Australian consumers to seek out infringing copies of copyright material. Game of Thrones provides an excellent case study through which to frame this analysis: it is both one of the least legally accessible television offerings and one of the most downloaded through filesharing networks of recent times. Our analysis shows that at the same time as rightsholder groups, particularly in the film and television industries, are lobbying for stronger laws to counter illicit distribution, the business practices of their member organisations are counter-productively increasing incentives for consumers to infringe. The lack of accessibility and high prices of copyright goods in Australia leads to substantial economic waste. The unmet consumer demand means that Australian consumers are harmed by lower access to information and entertainment goods than consumers in other jurisdictions. The higher rates of infringement that fulfils some of this unmet demand increases enforcement costs for copyright owners and imposes burdens either on our judicial system or on private entities – like ISPs – who may be tasked with enforcing the rights of third parties. Most worryingly, the lack of convenient and cheap legitimate digital distribution channels risks undermining public support for copyright law. Our research shows that consumers blame rightsholders for failing to meet market demand, and this encourages a social norm that infringing copyright, while illegal, is not morally wrongful. The implications are as simple as they are profound: Australia should not take steps to increase the strength of copyright law at this time. The interests of the public and those of rightsholders align better when there is effective competition in distribution channels and consumers can legitimately get access to content. While foreign rightsholders are seeking enhanced protection for their interests, increasing enforcement is likely to increase their ability to engage in lucrative geographical price-discrimination, particularly for premium content. This is only likely to increase the degree to which Australian consumers feel that their interests are not being met and, consequently, to further undermine the legitimacy of copyright law. If consumers are to respect copyright law, increasing sanctions for infringement without enhancing access and competition in legitimate distribution channels could be dangerously counter-productive. We suggest that rightsholders’ best strategy for addressing infringement in Australia at this time is to ensure that Australians can access copyright goods in a timely, affordable, convenient, and fair lawful manner.
Resumo:
This thesis introduces a theory of intellectual property (IP) law informed by Islamic Shari'a. The sources and objectives of Islamic Shari'a support the theoretical framework underpinning IP laws. However, they strongly emphasise the importance of development goals in intellectual property policy making. This thesis argues that an optimal IP system from an Islamic perspective shall not overprotect IP holders but should instead endeavor to empower people to access knowledge resources to enhance access to education, public health and economic opportunities. Taking Libya as a case study, this thesis makes recommendations for the improvement of IP law that have important broader implications for developing countries.