742 resultados para privacy enhancing technologies
Resumo:
Campylobacteriosis is an infection frequently acquired through the consumption of animal origin products. Chicken can be considered the main responsible cause in the transmission chain of this disease. Ionizing radiation was used to verify the reduction of the microbiological load of Campylobacter jejuni present in chicken liver, which, in natura, can present contamination in up to 100% of the cases. The doses of irradiation used were: 0.20 kGy, 0.27 kGy, 0.30 kGy and 0.35 kGy. The samples of chicken liver were acquired in aviaries, local supermarkets and large chain supermarkets. The samples were analyzed for Campylobacter at FIOCRUZ. Irradiation was performed at COPPE/UFRJ, using a Gamma Cell Irradiator with a 60Co gamma source. Only the frozen sample acquired at the local supermarket did not contain the bacterium. Campylobacter sp. was present in all other samples, even when using procedures and technologies that aimed at the impediment of the presence of this bacterium in food and, consequently, at the protection of human health. On the whole, the results were satisfactory; nevertheless, it is known that the bacterial growth conditions required by this bacterium are uncommon when compared to other enteropathogenic bacteria.
Resumo:
The application of technologies to extend the postharvest life of mangosteen fruit was studied and compared to storage at 25 °C/70-75%R.H (25 °C control treatment). The fruits were packed in expanded polystyrene (EPS) trays (5 fruits/tray). Five treatments were carried out at 13 °C/ 90-95% RH: application of carnauba wax coating, lecithin + CMC (carboxymethyl cellulose) coating, 50 µm LDPE (low density polyethylene) film coating, 13 µm PVC (Polyvinyl chloride), and non-coated sample (13 °C control treatment). Physicochemical analyses were performed twice a week. A statistical design was completely randomized with 8 repetitions for each treatment plus the control treatment. The results were submitted to variance analysis, and the averages compared by the Tukey test at 5% probability. Among the quality parameters analyzed, more significant differences were observed for weight loss, texture, and peel moisture content. The results showed that the maximum storage period for mangosteen at 25 °C is two weeks; while storage at13 °C can guarantee the conservation of this fruit for 25 days. Therefore, the treatment at 13 °C/90-95% RH without the use of coatings and films was more effective and economical.
Resumo:
The purpose of this master’s thesis was to study the opportunity to apply Lean practices to product management function which happens in an office environment. Since product management plays an important role in the company’s success story, it’s important to have it functioning as effectively as possible. The goal was to find those Lean tools and methods that fit the best to the needs of product management. The research was conducted as a qualitative action research which comprises a comprehensive literature review and a single case study. Theoretical information about Lean Thinking and product management was collected from articles, literature and Internet sources. Moreover, empirical data was collected by conducting interviews in the Case Company’s product management department in order to gain an in-depth understanding of product management’s problematics. The results indicate that most of the product management challenges could be overcome by applying Lean practises. Based on the usability rate, which has been discussed in the empirical part of this study, the most suitable Lean practises for product management function are: value stream mapping, Kanban and KPIs.
Resumo:
This thesis focuses on the private membership test (PMT) problem and presents three single server protocols to resolve this problem. In the presented solutions, a client can perform an inclusion test for some record x in a server's database, without revealing his record. Moreover after executing the protocols, the contents of server's database remain secret. In each of these solutions, a different cryptographic protocol is utilized to construct a privacy preserving variant of Bloom filter. The three suggested solutions are slightly different from each other, from privacy perspective and also from complexity point of view. Therefore, their use cases are different and it is impossible to choose one that is clearly the best between all three. We present the software developments of the three protocols by utilizing various pseudocodes. The performance of our implementation is measured based on a real case scenario. This thesis is a spin-off from the Academy of Finland research project "Cloud Security Services".
Resumo:
This document is focused on studying privacy perception and personality traits of users in the context of smartphone application privacy. It is divided into two parts. The first part presents an in depth systematic literature review of the existing academic writings available on the topic of relation between privacy perception and personality traits. Demographics, methodologies and other useful insight is extracted and the available literature is divided into broader group of topics bringing the five main areas of research to light and highlighting the current research trends in the field along with pinpointing the research gap of interest to the author. The second part of the thesis uses the results from the literature review to administer an empirical study to investigate the current privacy perception of users and the correlation between personality traits and privacy perception in smartphone applications. Big five personality test is used as the measure for personality traits whereas three sub-variables are used to measure privacy perception i.e. perceived privacy awareness, perceived threat to privacy and willingness to trade privacy. According to the study openness to experience is the most dominant trait having a strong correlation with two privacy sub-variables whereas emotional stability doesn’t show any correlation with privacy perception. Empirical study also explores other findings as preferred privacy sources and application installation preferences that provide further insight about users and might be useful in future.
Resumo:
The Thesis title” Healthcare services in cloud computing” discusses the healthcare services available in the new converging technology called cloud computing. This computing technology had craved its path in the desirable market field healthcare. Healthcare is an extensive and a massive mission of maintenance and providing a complete treatment to the person suffering from ailments. In the olden days well equipped healthcare surveillance is not accessible to all communities of people due to several reasons like, geographical locations, equipment cost, and infrastructure, and skilled medical practitioners, now due to the advancement of the medicine in cloud technology has reached some of its barriers making it more viable to all the people (communities) with all the robust technologies and techniques. This study will give an overview of the healthcare transformation of different approaches of cloud computing over information technology and its strategic usage. Further enhancing better healthcare to ensure scalable, compatible functions supporting the well-being, this study also considers the techniques of cloud computing and its application, advancement in healthcare.
Resumo:
Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.
Resumo:
Since the early 1970's, Canadians have expressed many concerns about the growth of government and its impact on their daily lives. The public has requested increased access to government documents and improved protection of the personal information which is held in government files and data banks. At the same time, both academics and practitioners in the field of public administration have become more interested in the values that public servants bring to their decisions and recommendations. Certain administrative values, such as accountability and integrity, have taken on greater relative importance. The purpose of this thesis is to examine the implementation of Ontario's access and privacy law. It centres on the question of whether or not the Freedom of Information and Protection of Privacy Act, 1987, (FIPPA) has answered the demand for open access to government while at the same time protecting the personal privacy of individual citizens. It also assesses the extent to which this relatively new piece of legislation has made a difference to the people of Ontario. The thesis presents an overview of the issues of freedom of information and protection of privacy in Ontario. It begins with the evolution of the legislation and a description of the law itself. It focuses on the structures and processes which have been established to meet the procedural and administrative demands of the Act. These structures and processes are evaluated in two ways. First, the thesis evaluates how open the Ontario government has become and, second, it determines how Ill carefully the privacy rights of individuals are safeguarded. An analytical framework of administrative values is used to evaluate the overall performance of the government in these two areas. The conclusion is drawn that, overall, the Ontario government has effectively implemented the Freedom of Information and Protection of Privacy Act, particularly by providing access to most government-held documents. The protection of individual privacy has proved to be not only more difficult to achieve, but more difficult to evaluate. However, the administrative culture of the Ontario bureaucracy is shown to be committed to ensuring that the access and privacy rights of citizens are respected.
Resumo:
A retrospective study of patients hospitalized with influenza and/or pneumonia in a Niagara area community hospital for the influenza season 2003-04 was designed with the main goal of enhancing pneumonia surveillance in acute care facilities and the following specific objectives: 1) identify etiologies, factors, and clinical presentation associated with pneumonia; 2) assess the ODIN score on ICU patients to predict outcomes of severe pneumonia; 3) identify the frequency of pneumonia and influenza in a hospital setting; and 4) develop a hospital pneumonia electronic surveillance tool. A total of 172 patients' charts (50% females) were reviewed and classified into two groups: those with diagnosis of pneumonia (n=132) and those without pneumonia (n=40). The latter group consisted mainly of patients with influenza (85%). Most patients were young (<10yrs) or elderly (>71yrs). Presenting body temperature <38°C, cough symptoms, respiratory and cardiac precomorbidities were common in both groups. Pneumonia was more frequent in males (p= .032) and more likely community-acquired (98%) than nosocomial (2%). No evidence of ventilator-associated pneumonia was found. Microbiology testing in 72% of cases detected 19 different pathogens. In pneumonia patients the most common organisms were Streptococcus pneumoniae (3%), Respiratory syncytial virus (4%), and Influenza A virus (2%). Conversely, Influenza A virus was identified in 73% of non-pneumonia patients. Community-acquired influenza was more common (80%) than nosocomial influenza (20%). The ODIN score was a good predictor of mortality and the new electronic surveillance tool was an effective prototype to monitor patients in acute care, especially during influenza season. The results of this study provided baseline data on respiratory illness surveillance and demonstrated that future research, including prospective studies, is warranted in acute care facilities.