869 resultados para Protection of Privacy


Relevância:

100.00% 100.00%

Publicador:

Resumo:

La presente tesi ha come scopo quello di individuare alcune problematiche relative all’esercizio e alla limitazione del diritto alla libertà di espressione nel contesto delle attività globali di sorveglianza e controllo delle tecnologie dell’informazione e della comunicazione. Tali attività, poste in essere da parte degli Stati e da parte degli operatori privati, sono favorite dal nebuloso rapporto tra norme di fonte pubblica, privata e informatica, e sono invece osteggiate dal ricorso, collettivo e individuale, alle possibilità offerte dalle tecnologie stesse per la conduzione di attività in anonimato e segretezza. La sorveglianza globale nel contesto delle privatizzazioni si serve del codice e dell’autonomia privata, così come la resistenza digitale ricorre alle competenze informatiche e agli spazi di autonomia d’azione dell’individuo. In questo contesto, la garanzia dell’esistenza e dell’esercizio dei diritti fondamentali dell’individuo, tra tutti il diritto alla libertà di espressione e il diritto alla tutela della riservatezza, passa per l’adozione di tecniche e pratiche di autotutela attraverso l’utilizzo di sistemi di cifratura e comunicazioni anonime. L’individuo, in questo conflitto tecnico e sociale, si trova a dover difendere l’esercizio dei propri diritti e finanche l’adempimento ai propri doveri, quando attinenti a particolari figure professionali o sociali, quali avvocati, operatori di giustizia, giornalisti, o anche semplicemente genitori. In conclusione dell’elaborato si propongono alcune riflessioni sulla formazione della cittadinanza e del mondo professionale, da parte dei giuristi delle nuove tecnologie, all’uso cosciente, consapevole e responsabile delle nuove tecnologie dell’informazione, con lo stimolo ad orientare altresì le proprie attività alla tutela e alla promozione dei diritti umani fondamentali, democratici, costituzionali, civili e sociali.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Slides used in lecture, explaining coursework and providing an introduction to the Data Protection Act. Students should use these resources as guidance for the forthcoming coursework (annotated bibliography). Like all materials you can expect slides to address issues which come up future assessment activities

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While several privacy protection techniques are pre- sented in the literature, they are not complemented with an established objective evaluation method for their assess- ment and comparison. This paper proposes an annotation- free evaluation method that assesses the two key aspects of privacy protection that are privacy and utility. Unlike some existing methods, the proposed method does not rely on the use of subjective judgements and does not assume a spe- cific target type in the image data. The privacy aspect is quantified as an appearance similarity and the utility aspect is measured as a structural similarity between the original raw image data and the privacy-protected image data. We performed an extensive experimentation using six challeng- ing datasets (including two new ones) to demonstrate the effectiveness of the evaluation method by providing a per- formance comparison of four state-of-the-art privacy pro- tection techniques.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Thesis (Master's)--University of Washington, 2016-06

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In recent years, there has been exponential growth in using virtual spaces, including dialogue systems, that handle personal information. The concept of personal privacy in the literature is discussed and controversial, whereas, in the technological field, it directly influences the degree of reliability perceived in the information system (privacy ‘as trust’). This work aims to protect the right to privacy on personal data (GDPR, 2018) and avoid the loss of sensitive content by exploring sensitive information detection (SID) task. It is grounded on the following research questions: (RQ1) What does sensitive data mean? How to define a personal sensitive information domain? (RQ2) How to create a state-of-the-art model for SID?(RQ3) How to evaluate the model? RQ1 theoretically investigates the concepts of privacy and the ontological state-of-the-art representation of personal information. The Data Privacy Vocabulary (DPV) is the taxonomic resource taken as an authoritative reference for the definition of the knowledge domain. Concerning RQ2, we investigate two approaches to classify sensitive data: the first - bottom-up - explores automatic learning methods based on transformer networks, the second - top-down - proposes logical-symbolic methods with the construction of privaframe, a knowledge graph of compositional frames representing personal data categories. Both approaches are tested. For the evaluation - RQ3 – we create SPeDaC, a sentence-level labeled resource. This can be used as a benchmark or training in the SID task, filling the gap of a shared resource in this field. If the approach based on artificial neural networks confirms the validity of the direction adopted in the most recent studies on SID, the logical-symbolic approach emerges as the preferred way for the classification of fine-grained personal data categories, thanks to the semantic-grounded tailor modeling it allows. At the same time, the results highlight the strong potential of hybrid architectures in solving automatic tasks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The thesis represents the conclusive outcome of the European Joint Doctorate programmein Law, Science & Technology funded by the European Commission with the instrument Marie Skłodowska-Curie Innovative Training Networks actions inside of the H2020, grantagreement n. 814177. The tension between data protection and privacy from one side, and the need of granting further uses of processed personal datails is investigated, drawing the lines of the technological development of the de-anonymization/re-identification risk with an explorative survey. After acknowledging its span, it is questioned whether a certain degree of anonymity can still be granted focusing on a double perspective: an objective and a subjective perspective. The objective perspective focuses on the data processing models per se, while the subjective perspective investigates whether the distribution of roles and responsibilities among stakeholders can ensure data anonymity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we present the results of mammography quality control tests related to the work with Portuguese mammography equipment, either in conventional or in digital mammography computed radiography, showing the main differences in the tested equipments. Quality control in mammography is a very special area of quality control in radiology, which demands relatively high knowledge on physics. Digital imaging is changing the standards of the radiographic imaging. Regarding mammography, this is yet a controversial issue owing to some limitations of the digital detectors, like the resolution for instance. A complete set of results regarding radiation protection of the patients submitted to mammography diagnosis is presented. A discussion of the quality image parameters and its interpretation in conventional and digital mammography is presented. In conclusion, we present a sample of results that can be considered as characteristics of mammography equipment in Portugal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract Background: Clinical research in the field of hypertension is now increasingly focusing on the potential effects of antihypertensive treatments that may go beyond the reduction of blood pressure (BP). In particular, renal protection appears as a desirable goal, especially considering that hypertension is associated with an increased risk of developing kidney damage, which may eventually lead to end-stage renal disease and a higher mortality. Dihydropyridine calcium channel blockers (CCBs) are widely used in the field of hypertension therapy but the different renal effects of the various CCBs have been poorly explored to date. Scope: This review will discuss available evidence on the renal effects of two calcium channel blockers: amlodipine and lercanidipine, on the basis of clinical data. Methods: MEDLINE and EMBASE were searched for inclusion of relevant studies. No limitations in time were considered. Results: Results from preclinical and clinical studies suggest that amlodipine is overall less effective in terms of renal protection when compared with other antihypertensive tested agents. Its beneficial effect in retarding the progression of renal disease is achievable only when combined with a blocker of the renin-angiotensin system. Conversely lercanidipine seems to provide renal protection in a similar way to ACE inhibitors, probably thanks to its mechanism of action which acts directly on the afferent and efferent renal arterioles. Conclusions: Treatment of hypertension with CCBs should take into consideration the special effects of each single agent at different levels; lercanidipine for example may play a useful role in the management not only of hypertension but also in renal protection of hypertensive patients.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this research project is to study current practices in enhancing visibility and protection of highway maintenance vehicles involved in moving operations such as snow removal and shoulder operations, crack sealing, and pothole patching. The results will enable the maintenance staff to adequately assess the applicability and impact of each strategy to their use and budget. The report’s literature review chapter examines the use of maintenance vehicle warning lights, retroreflective tapes, shadow vehicles and truck-mounted attenuators, and advanced vehicle control systems, as well as other practices to improve visibility for both snowplow operators and vehicles. The chapter concludes that the Manual on Uniform Traffic Control Devices does not specify what color or kind of warning lights to use. Thus, a wide variety of lights are being used on maintenance vehicles. The study of the relevant literatures also suggests that there are no clear guidelines for moving work zones at this time. Two types of surveys were conducted to determine current practices to improve visibility and safety in moving work zones across the country and in the state of Iowa. In the first survey of state departments of transportation, most indicated using amber warning lights on their maintenance vehicles. Almost all the responding states indicated using some form of reflective material on their vehicles to make them more visible. Most participating states indicated that the color of their vehicles is orange. Most states indicated using more warning lights on snow removal vehicles than their other maintenance vehicles. All responding state agencies indicated using shadow vehicles and/or truck-mounted attenuators during their moving operations. In the second survey of Iowa counties, most indicated using very similar traffic control and warning devices during their granular road maintenance and snow removal operations. Mounting warning signs and rotating or strobe lights on the rear of maintenance vehicles is common for Iowa counties. The most common warning devices used during the counties’ snow removal operations are reflective tapes, warning flags, strobe lights, and auxiliary headlamps.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Needle-free procedures are very attractive ways to deliver vaccines because they diminish the risk of contamination and may reduce local reactions, pain or pain fear especially in young children with a consequence of increasing the vaccination coverage for the whole population. For this purpose, the possible development of a mucosal malaria vaccine was investigated. Intranasal immunization was performed in BALB/c mice using a well-studied Plasmodium berghei model antigen derived from the circumsporozoite protein with the modified heat-labile toxin of Escherichia coli (LTK63), which is devoid of any enzymatic activity compared to the wild type form. Here, we show that intranasal administration of the two compounds activates the T and B cell immune response locally and systemically. In addition, a total protection of mice is obtained upon a challenge with live sporozoites.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Bridge deck and substructure deterioration due to the corrosive effects of deicing chemicals on reinforcing steel is a problem facing many transportation agencies. The main concern is protection of older bridges with uncoated reinforcing steel. Many different methods have been tried over the past years to repair bridge decks. The Iowa system of bridge deck rehabilitation has proven to be very effective. It consists of scarifying the deck surface, removing any deteriorated concrete, and overlaying with low slump dense concrete. Another rehabilitation method that has emerged is cathodic protection. It has been used for many years in the protection of underground pipelines and in 1973 was first installed on a bridge deck. Cathodic protection works by applying an external source of direct current to the embedded reinforcing steel, thereby changing the electrochemical process of corrosion. The corroding steel, which is anodic, is protected by changing it to a cathodic state. The technology involved in cathodic protection as applied to bridge decks has improved over the last 12 years. One company marketing new technology in cathodic protection systems is Raychem Corporation of Menlo Park, California. Their system utilizes a Ferex anode mesh that distributes the impressed direct current over the deck surface. Ferex mesh was selected because it seemed readily adaptable to the Iowa system of bridge deck rehabilitation. The bridge deck would be scarified, deteriorated concrete removed, Ferex anode mesh installed, and overlaid with low slump dense concrete. The Federal Highway Administration (FHWA) promotes cathodic protection under Demonstration Project No. 34, "Cathodic Protection for Reinforced Concrete Bridge Decks."

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Initial non-inflammatory demyelination in canine distemper virus infection (CDV) develops against a background of severe immunosuppression and is therefore, thought to be virus-induced. However, recently we found a marked invasion of T cells throughout the central nervous system (CNS) in dogs with acute distemper despite drastic damage to the immune system. In the present study, this apparent paradox was further investigated by immunophenotyping of lymphocytes, following experimental CDV challenge in vaccinated and non-vaccinated dogs. In contrast to CDV infected, unprotected dogs, vaccinated dogs did not become immunosuppressed and exhibited a strong antiviral immune response following challenge with virulent CDV. In unprotected dogs rapid and drastic lymphopenia was initially due to depletion of T cells. In peripheral blood, CD4(+) T cells were more sensitive and depleted earlier and for a longer time than CD8(+) cells which recovered soon. In the cerebrospinal fluid (CSF) we could observe an increase in the T cell to B cell and CD8(+) to CD4(+) ratios. Thus, partial protection of the CD8(+) cell population could explain why part of the immune function in acute distemper is preserved. As found earlier, T cells invaded the CNS parenchyma in these dogs but also in the protected challenged dogs, which did not develop any CNS disease at all. Since markers of T cell activation were upregulated in both groups of animals, this phenomenon could in part be related to non-specific penetration of activated T cells through the blood brain barrier. However, in diseased animals much larger numbers of T cells were found in the CNS than in the protected dogs, suggesting that massive invasion of T cells in the brain requires CDV expression in the CNS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Pro-gradu tutkielman tavoitteena on tutkia, miten yritykset tasapainoilevat tiedon jakamisen ja suojaamisen välillä innovaatioyhteistyöprojekteissa, ja miten sopimukset, immateriaalioikeudet ja luottamus voivat vaikuttaa tähän tasapainoon. Yhteistyössä yritysten täytyy jakaa tarpeellista tietoa kumppanilleen, mutta toisaalta niiden täytyy varoa, etteivät ne menetä ydinosaamiseensa kuuluvaa tietoa ja kilpailuetuaan. Yrityksillä on useita keinoja tietovuodon estämiseen. Tutkielmassa keskitytään patenttien, sopimusten ja liikesalaisuuksien käyttöön tietoa suojaavina mekanismeina. Kyseiset suojamekanismit vaikuttavat luottamukseen kumppaneiden välillä, ja täten myös näiden halukkuuteen jakaa tietoa kumppaneilleen. Jos kumppanit eivät jaa tarpeeksi tietoa toisilleen, voi yhteistyö epäonnistua. Sopimusten, immateriaalioikeuksien ja luottamuksen rooleja ja vuorovaikutusta tutkitaan kahdenvälisissä yhteistyöprojekteissa. Tutkielmassa esitellään neljä case-esimerkkiä, jotka on koottu suomalaisen metsätoimialan yrityksen haastatteluista.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This work describes different possibilities of protection and control system improvement of primary distribution substation. The status of condition and main problems of power networks from reliability point of view in Russia are described. This work studies technologies used today in Russia for protection of distribution networks with their disadvantages. Majority of medium voltage networks (6-35 kV) has isolated network point. There is still no any protection available on the market which allows to estimate distance to fault in case of earth fault. The thesis analyses methods of earth fault distance calculation. On the basis of computer simulation the influence of various factors on calculation accuracy is studied. The practical implementation of the method presupposes usage of digital relay. Application of digital relay is accompanied by numerous opportunities which are described in this work. Also advantages of system implemented on the basis of IEC 61850 standard are examined. Finally, suitability of modern digital relays from GOST standard point of view is analyzed.