869 resultados para Protection of Privacy


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent developments in biological research, has shown that the initial maximum permissible exposure (MPE) limits for protection of workers from risks associated with artificial optical radiations were more stringent than needed. Using the most recent MPE limits for artificial optical radiation this piece of work was focused on the investigation of the level of visible light attenuation needed by automatic welding filters in case of switching failure. Results from the comparison of different exposure standards were employed in investigating the need of Vis/IR and blue light transmittance requirement for automatic welding filters. Real and arbitrary spectra were taken into consideration for the worst and best case scenarios of artificial optical radiations. An excel worksheet developed during the execution of this project took into consideration the exposure from different light sources and the precision of the spectrometer used in measuring the transmittances of a welding filter. The worksheet was developed and tested with known product properties to investigate the validity of its formulation. The conclusion drawn from this project was that attenuation in the light state will be needed for products with the darkest state shade 11 or higher. Also shown is that current welding filter protects the eye well enough even in the case of switching failure.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

1. The protection offered by intermittent perfusion of of cardioplegic solution through the coronary sinus was investigated in isovolumic blood-perfused dog heart preparations submitted to 60 min of ischemia and 45 min of reperfusion.2. The preparations were divided into three treatment groups: a) coronary sinus, consisting of preparations (N = 10) perfused through the coronary sinus under 40 cm water pressure; b) aortic, consisting of preparations (N = 10) perfused through the aortic stump under 100 mmHg pressure; c) control, consisting of hearts (N = 9) that were not perfused with cardioplegic solution.3. Properties of contractile capacity and relaxation were markedly impaired in the control group but were preserved to a comparable extent in the groups perfused with cardioplegic solution through the aorta and coronary sinus. Developed pressure decreased in the control group (before ischemia: 70 +/- 5.5 mmHg; after reperfusion: 35 +/- 12 mmHg; P < 0.05) and didn't vary in the aortic group (from 69 +/- 4 mmHg to 65 +/- 13 mmHg; P > 0.05) and coronary sinus group (from 69 +/- 4.6 mmHg to 60 +/- 10 mmHg; P > 0.05). Myocardial relaxation was evaluated by the +/- dp/dt ratio. In the control group there was impairment of myocardial relaxation as indicated by an increase of this index after reperfusion (from 1.05 +/- 0.05 to 1.46 +/- 0.23; P < 0.05), whereas in the aortic (from 1.10 +/- 0.13 to 1.15 +/- 0.20; P > 0.05) and the coronary sinus (from 1.03 +/- 0.14 to 1.08 +/- 0.16; P > 0.05) groups there was no variation. Ultrastructural changes in the myocardium were negligible in all three groups at the end of reperfusion.4. We conclude that intermittent perfusion of a hypothermic cardioplegic solution through the coronary sinus is effective for the protection of the myocardium during total ischemia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background. Melatonin is a free radical scavenger with important actions in the study of renal ischemia and reperfusion (I/R). This study evaluated possible renal protection of high doses of melatonin in an experimental model of I/R in which rats were submitted to acute hyperglycemia under anesthesia with isoflurane.Method. Forty-four male Wistar rats, weighing more than 300 g, were randomly divided into 5 groups: G1, sham (n = 10); G2, melatonin (n = 10; 50 mg.kg(-1)); G3, hyperglycemia (n = 9; glucose 2.5 g.kg(-1)); G4, hyperglycemia/melatonin (n = 10; 2.5 g.kg(-1) glucose + melatonin 50 mg.kg(-1)); and G5, I/R (n = 5). In all groups, anesthesia was induced with 4% isoflurane and maintained with 1.5% to 2.0% isoflurane. Intraperitoneal injection of melatonin (G1, G4), glucose (G3, G4), or saline (G1, G5) was performed 40 minutes before left renal ischemia. Serum plasma values for creatinine and glucose were determined at baseline (M1), immediately following reperfusion (M2), and 24 hours after completion of the experiment (M3). Histological analysis was performed to evaluate tubular necrosis (0-5).Results. Serum glucose was higher at M2 in the groups supplemented with glucose, hyperglycemia (356.00 +/- 107.83), and hyperglycemia/melatonin (445.3 +/- 148.32). Creatinine values were higher at T3 (P = .0001) for I/R (3.6 +/- 0.37), hyperglycemia/melatonin (3.9 +/- 0.46), and hyperglycemia (3.71 +/- 0.69) and lower in the sham (0.79 +/- 0.16) and melatonin (2.01 +/- 1.01) groups, P < .05. Histology showed no necrosis injury in the G1, lesion grade 2 in the G2, and severe acute tubular necrosis in the G3: (grade 4), G4: (grade 5) and G5: (grade 4) groups (P < .0001).Discussion. Melatonin protected the kidneys submitted to I/R in rats without hyperglycemia; however, this did not occur when the I/R lesion was associated with hyperglycemia.Conclusions. Due to its antioxidant and antiapoptotic action, melatonin was able to mitigate, but not prevent acute tubular necrosis in rats with hyperglycemia under anesthesia by isoflurane.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La Tesi tratta i concetti di Privacy e Protezione dei Dati personali, contestualizzandone il quadro normativo e tecnologico con particolare riferimento ai contesti emergenti rappresentati – per un verso – dalla proposta di nuovo Regolamento generale sulla protezione dei dati personali (redatto dal Parlamento Europeo e dal Consiglio dell’Unione Europea), – per un altro – dalla metodologia di progettazione del Privacy by Design e – per entrambi – dalla previsione di un nuovo attore: il responsabile per la protezione dei dati personali (Privacy Officer). L’elaborato si articola su tre parti oltre introduzione, conclusioni e riferimenti bibliografici. La prima parte descrive il concetto di privacy e le relative minacce e contromisure (tradizionali ed emergenti) con riferimento ai contesti di gestione (aziendale e Big Data) e al quadro normativo vigente. La seconda Parte illustra in dettaglio i principi e le prassi del Privacy by Design e la figura del Privacy Officer formalmente riconosciuta dal novellato giuridico. La terza parte illustra il caso di studio nel quale vengono analizzate tramite una tabella comparativa minacce e contromisure rilevabili in un contesto aziendale.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

New technologies, in particular those stemming from digitisation, allow amongst other things the production of perfect copies, instantaneous and ubiquitous distribution of and easy access to information with no real location restrictions. The effects of these technological advances have largely been perceived as negative for the protection of traditional cultural expressions (TCE), both because of the peculiarities of the digital networked environment and because of the lack of appropriate intellectual property protection models for TCE. The purpose of this article is, while accounting for the diversity and complexity of issues related to TCE, to reveal a more positive side of digital technologies. It shows the potential of these to be proactively applied and the further reaching possibilities for designing an efficient multi-level and multi-faceted toolbox for the protection and promotion of TCE in the digital ecology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

During the last decades, the virtual world increasingly gained importance and in this context the enforcement of privacy rights became more and more difficult. An important emanation of this trend is the right to be forgotten enshrining the protection of the data subject’s rights over his/her “own” data. Even though the right to be forgotten has been made part of the proposal for a completely revised Data Protection Regulation and has recently been acknowledged by the Court of Justice of the European Union (“Google/Spain” decision), to date, the discussions about the right and especially its implementation with regard to the fundamental right to freedom of expression have remained rather vague and need to be examined in more depth.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Self-administered online surveys provide a higher level of privacy protection to respondents than surveys administered by an interviewer. Yet, studies show that asking sensitive questions is problematic also in self-administered mode. Because respondents might not be willing to reveal the truth and provide answers that are subject to social desirability bias, the validity of prevalence estimates of sensitive behaviors gained via online surveys can be challenged. A wellknown method to combat these problems is the Randomized Response Technique (RRT). However, convincing evidence that the RRT provides more valid estimates than direct questioning in online mode is still lacking. Moreover, an alternative approach called the Crosswise Model (CM) has recently been suggested to overcome some of the deficiencies of the RRT. We therefore conducted an experimental study in which different implementations of the RRT and the CM have been tested and compared to direct questioning. Our study is a large-scale online survey on sensitive behaviors by students such as cheating in exams and paper plagiarism. The results of the study reveal poor per-formance of the RRT, while the CM yielded significantly higher estimates of sensitive behaviors than direct questioning. We conclude that the CM is a promising approach for asking sensitive questions in self-administered surveys.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Self-administered online surveys provide a higher level of privacy protection to respondents than surveys administered by an interviewer. Yet, studies show that asking sensitive questions is problematic also in self-administered mode. Because respondents might not be willing to reveal the truth and provide answers that are subject to social desirability bias, the validity of prevalence estimates of sensitive behaviors gained via online surveys can be challenged. A well-known method to combat these problems is the Randomized Response Technique (RRT). However, convincing evidence that the RRT provides more valid estimates than direct questioning in online mode is still lacking. Moreover, an alternative approach called the Crosswise Model (CM) has recently been suggested to overcome some of the deficiencies of the RRT. In the context of an online survey on plagiarism and cheating on exams among students of two Swiss universities (N = 6,494), we tested different implementations of the RRT and the CM and compared them to direct questioning using a randomized experimental design. Results reveal a poor performance of the RRT, which failed to elicit higher prevalence estimates than direct questioning. Using the CM however, significantly higher prevalence estimates were obtained making it a promising new alternative to the conventional RRT.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

New technologies, in particular those stemming from digitization, allow amongst other things the production of perfect copies, instantaneous and ubiquitous distribution of and easy access to information with no real location restrictions. The effects of these technological advances have largely been perceived as negative for the protection of Traditional Cultural Expressions (TCE), both because of the peculiarities of the digital networked environment and because of the lack of appropriate intellectual property protection models for TCE. The purpose of this article is, while accounting for the diversity and complexity of issues related to TCE, to reveal a more positive side of digital technologies. It shows the potential of these to be proactively applied and the further reaching possibilities for designing an efficient multi-level and multi-faceted toolbox for the protection and promotion of TCE in the digital ecology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Self-administered online surveys provide a higher level of privacy protection to respondents than surveys administered by an interviewer. Yet, studies indicate that asking sensitive questions is problematic also in self-administered surveys. Because respondents might not be willing to reveal the truth and provide answers that are subject to social desirability bias, the validity of prevalence estimates of sensitive behaviors from online surveys can be challenged. A well-known method to overcome these problems is the Randomized Response Technique (RRT). However, convincing evidence that the RRT provides more valid estimates than direct questioning in online surveys is still lacking. A new variant of the RRT called the Crosswise Model has recently been proposed to overcome some of the deficiencies of existing RRT designs. We therefore conducted an experimental study in which different implementations of the RRT, including two implementations of the crosswise model, were tested and compared to direct questioning. Our study is a large-scale online survey (N = 6,037) on sensitive behaviors by students such as cheating in exams and plagiarism. Results indicate that the crosswise-model RRT---unlike the other variants of RRT we evaluated---yields higher prevalence estimates of sensitive behaviors than direct questioning. Whether higher estimates are a sufficient condition for more valid results, however, remains questionable.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The unprecedented success of social networking sites (SNSs) has been recently overshadowed by concerns about privacy risks. As SNS users grow weary of privacy breaches and thus develop distrust, they may restrict or even terminate their platform activities. In the long run, these developments endanger SNS platforms’ financial viability and undermine their ability to create individual and social value. By applying a justice perspective, this study aims to understand the means at the disposal of SNS providers to leverage the privacy concerns and trusting beliefs of their users—two important determinants of user participation on SNSs. Considering that SNSs have a global appeal, empirical tests assess the effectiveness of justice measures for three culturally distinct countries: Germany, Russia and Morocco. The results indicate that these measures are particularly suited to address trusting beliefs of SNS audience. Specifically, in all examined countries, procedural justice and the awareness dimension of informational justice improve perceptions of trust in the SNS provider. Privacy concerns, however, are not as easy to manage, because the impact of justice-based measures on privacy concerns is not universal. Beyond theoretical value, this research offers valuable practical insights into the use of justice-based measures to promote trust and mitigate privacy concerns in a cross-cultural setting.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Participatory Sensing combines the ubiquity of mobile phones with sensing capabilities of Wireless Sensor Networks. It targets pervasive collection of information, e.g., temperature, traffic conditions, or health-related data. As users produce measurements from their mobile devices, voluntary participation becomes essential. However, a number of privacy concerns -- due to the personal information conveyed by data reports -- hinder large-scale deployment of participatory sensing applications. Prior work on privacy protection, for participatory sensing, has often relayed on unrealistic assumptions and with no provably-secure guarantees. The goal of this project is to introduce PEPSI: a Privacy-Enhanced Participatory Sensing Infrastructure. We explore realistic architectural assumptions and a minimal set of (formal) privacy requirements, aiming at protecting privacy of both data producers and consumers. We design a solution that attains privacy guarantees with provable security at very low additional computational cost and almost no extra communication overhead.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the last several years, micro-blogging Online Social Networks (OSNs), such as Twitter, have taken the world by storm, now boasting over 100 million subscribers. As an unparalleled stage for an enormous audience, they offer fast and reliable centralized diffusion of pithy tweets to great multitudes of information-hungry and always-connected followers. At the same time, this information gathering and dissemination paradigm prompts some important privacy concerns about relationships between tweeters, followers and interests of the latter. In this paper, we assess privacy in today?s Twitter-like OSNs and describe an architecture and a trial implementation of a privacy-preserving service called Hummingbird. It is essentially a variant of Twitter that protects tweet contents, hashtags and follower interests from the (potentially) prying eyes of the centralized server. We argue that, although inherently limited by Twitter?s mission of scalable information-sharing, this degree of privacy is valuable. We demonstrate, via a working prototype, that Hummingbird?s additional costs are tolerably low. We also sketch out some viable enhancements that might offer better privacy in the long term.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Which is the economic value of personal information? -How the exchange of information is benefiting society and the economy -How companies create value from personal information (by providing new services or servicing better an existing need). -The mechanisms by which personal information exchange creates economic value - How the level of privacy protection influences value creation in different markets