8 resultados para privacy considerations

em Digital Commons at Florida International University


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Parameter design is an experimental design and analysis methodology for developing robust processes and products. Robustness implies insensitivity to noise disturbances. Subtle experimental realities, such as the joint effect of process knowledge and analysis methodology, may affect the effectiveness of parameter design in precision engineering; where the objective is to detect minute variation in product and process performance. In this thesis, approaches to statistical forced-noise design and analysis methodologies were investigated with respect to detecting performance variations. Given a low degree of process knowledge, Taguchi's methodology of signal-to-noise ratio analysis was found to be more suitable in detecting minute performance variations than the classical approach based on polynomial decomposition. Comparison of inner-array noise (IAN) and outer-array noise (OAN) structuring approaches showed that OAN is a more efficient design for precision engineering. ^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rising health care costs are causing some employers to assess and regulate the health behaviors of their employees. Different approaches and levels of non-smoking regulations are discussed, and the legal parameters and challenges of regulating employees’ private behaviors are explored.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Four years after calling for structural and conceptual changes, Raúl Castro finally unveiled a roadmap of substantive economic reforms. Over the next 18 months, at least a million workers will be laid off from the bloated state sector. Alternative forms of earning a living – self-employment, cooperatives, leasing of land or physical space, among others – are being authorized as old constraints on these alternatives are rescinded. From the perspective of ordinary Cubans, these reforms – called an actualizaciόn, or an update of the economic model – were long overdue. Yet, in hindsight, the slow-paced process can be explained, not in terms of the need for time to “identify” Cuba’s economic problems which have been known for decades, but by Raúl Castro’s emphasis on la institucionalidad, the need to channel decision making through institutions. His brother left a chaotic state apparatus which first needed mending before an elite consensus on the reform package could be forged. Cuba is entering a situation without precedent: this package is likely to run its own course without the Comandante (Fidel Castro) stopping it. By 2015, Cuban society will probably look different than today, featuring unprecedented inequality and living standards that are on the rise.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abuse of drugs and alcohol in the workplace has reached epidemic proportions in the hotel industry. The authors review considerations for drug testing and discuss drug and alcohol testing methods and the manner in which an effective policy should be developed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bottoms—Gay men who prefer to be penetrated, sexually—are more stigmatized than other gay men, and may develop and experience identities differently than other gay, bisexual, or heterosexual men. This paper explores intrinsic dispositions and extrinsic motivations that may lead bottoms to perform and embody psychosocial and sexual identities in intimate, interpersonal, and social contexts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.