53 resultados para Third parties

em CentAUR: Central Archive University of Reading - UK


Relevância:

60.00% 60.00%

Publicador:

Resumo:

There is growing interest in the ways in which the location of a person can be utilized by new applications and services. Recent advances in mobile technologies have meant that the technical capability to record and transmit location data for processing is appearing in off-the-shelf handsets. This opens possibilities to profile people based on the places they visit, people they associate with, or other aspects of their complex routines determined through persistent tracking. It is possible that services offering customized information based on the results of such behavioral profiling could become commonplace. However, it may not be immediately apparent to the user that a wealth of information about them, potentially unrelated to the service, can be revealed. Further issues occur if the user agreed, while subscribing to the service, for data to be passed to third parties where it may be used to their detriment. Here, we report in detail on a short case study tracking four people, in three European member states, persistently for six weeks using mobile handsets. The GPS locations of these people have been mined to reveal places of interest and to create simple profiles. The information drawn from the profiling activity ranges from intuitive through special cases to insightful. In this paper, these results and further extensions to the technology are considered in light of European legislation to assess the privacy implications of this emerging technology.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The financial crisis of 2007-2009, has precipitated large scale regulatory change. Financial organizations are faced with implementing new regulations of considerable breadth and depth. Firms are faced with engaging in complex and costly change management programs at a time when profits are diminished. Furthermore, investors are becoming increasingly focused on compliance are seeking to ensure that organizations can demonstrate robust compliance practices as part of their due diligence process .The role of IS in underpinning stable, is paramount. IS allows the stable and consistent controls for meeting regulations in order to ensure long term effective compliance. Consequently, our study explores the IS capabilities which support the post crisis regulatory landscape. We identify eight key capabilities: Managing Internal Controls, Measuring Monitoring and Reporting Transactions, IS Development and Procurement, Managing Third Parties, Sharing and Selecting Best Practice, IS Leadership, Data Management and Enabling Cultural Change.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In the present contribution, I discuss the claim, endorsed by a number of authors, that contributing to a collective harm is the ground for special responsibilities to the victims of that harm. Contributors should, between them, cover the costs of the harms they have inflicted, at least if those harms would otherwise be rights-violating. I raise some doubts about the generality of this principle before moving on to sketch a framework for thinking about liability for the costs of harms in general. This framework uses a contractualist framework to build an account of how to think about liability for costs on the basis of the presumably attractive thought that individual agents should have as much control over their liabilities as is compatible with others having like control. I then use that framework to suggest that liability on the basis of contribution should be restricted to cases in which the contributors could have avoided their contribution relatively costlessly, in which meeting the liability is not crippling for them, and in which such a liability would not have chilling effects, either on them or on third parties. This account of the grounds for contributory liability also has the advantage of avoiding a number of awkward questions about what counts as a contribution by shifting the issue away from often unanswerable questions about the precise causal genesis of some harm or other. Instead, control over conduct, which plausibly has some relation to the harm, becomes crucial. On the basis of this account, I then investigate whether a number of uses of the contributory principle are entirely appropriate. I argue that contributory liability is not appropriate for cases of collective harms committed by coordinated groups in the way that, for example, Iris Marion Young and Thomas Pogge have suggested and that further investigation of how members of such groups may be liable will be needed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present the extension of a methodology to solve moving boundary value problems from the second-order case to the case of the third-order linear evolution PDE qt + qxxx = 0. This extension is the crucial step needed to generalize this methodology to PDEs of arbitrary order. The methodology is based on the derivation of inversion formulae for a class of integral transforms that generalize the Fourier transform and on the analysis of the global relation associated with the PDE. The study of this relation and its inversion using the appropriate generalized transform are the main elements of the proof of our results.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We use the third perihelion pass by the Ulysses spacecraft to illustrate and investigate the “flux excess” effect, whereby open solar flux estimates from spacecraft increase with increasing heliocentric distance. We analyze the potential effects of small-scale structure in the heliospheric field (giving fluctuations in the radial component on timescales smaller than 1 h) and kinematic time-of-flight effects of longitudinal structure in the solar wind flow. We show that the flux excess is explained by neither very small-scale structure (timescales < 1 h) nor by the kinematic “bunching effect” on spacecraft sampling. The observed flux excesses is, however, well explained by the kinematic effect of larger-scale (>1 day) solar wind speed variations on the frozen-in heliospheric field. We show that averaging over an interval T (that is long enough to eliminate structure originating in the heliosphere yet small enough to avoid cancelling opposite polarity radial field that originates from genuine sector structure in the coronal source field) is only an approximately valid way of allowing for these effects and does not adequately explain or account for differences between the streamer belt and the polar coronal holes.