947 resultados para Data Protection Authorities
Resumo:
Rapport de stage présenté à la Faculté des Études Supérieures des arts et sciences, Département de criminologie, en vue de l’obtention du grade de Maîtrise (M. Sc.) en criminologie, option intervention
Resumo:
Pesticide residues in food and environment pose serious health risks to human beings. Plant protection laws, among other things, regulate misuse of agricultural pesticides. Compliance with such laws consequently reduces risks of pesticide residues in food and the environment. Studies were conducted to assess the compliance with plant protection laws among tomato farmers in Mvomero District, Morogoro Region, Tanzania. Compliance was assessed by examining pesticide use practices that are regulated by the Tanzanian Plant Protection Act (PPA) of 1997. A total of 91 tomato farmers were interviewed using a structured questionnaire. Purposive sampling was used in selecting at least 30 respondent farmers from each of the three villages of Msufini, Mlali and Doma in Mvomero District, Morogoro Region. Simple Random Sampling was used to obtain respondents from the sampling frame. Individual and social factors were examined on how they could affect pesticide use practices regulated by the law. Descriptive statistics, mainly frequency, were used to analyze the data while associations between variables were determined using Chi-Square and logistic regression model. The results showed that respondents were generally aware of the existence of laws on agriculture, environment and consumer health, although none of them could name a specific Act. The results revealed further that 94.5% of the farmers read instructions on the pesticides label. However, only 21% used the correct doses of pesticides, 40.7% stored pesticides in special stores, 68.1% used protective gear, while 94.5% always read instructions on the label before using a pesticide product. Training influenced the application rate of pesticide (p < 0.001) while awareness of agricultural laws significantly influenced farmers’ tendency to read information on the labels (p < 0.001). The results showed further that education significantly influenced the use of protective gears by farmers (p = 0.042). Education also significantly affected the manner in which farmers stored pesticide-applying equipment (p = 0.024). Furthermore, farmers’ awareness of environmental laws significantly (p = 0.03) affected farmers’ disposal of empty pesticide containers. Results of this study suggest the need for express provisions on safe use and handling of pesticides and related offences in the Act, and that compliance should be achieved through education rather than coercion. Results also suggest establishment of pesticide disposal mechanisms and structures to reduce unsafe disposal of pesticide containers. It is recommended that farmers should be educated and trained on proper use of pesticides. Farmers’ awareness on laws affecting food, environment and agriculture should be improved.
Resumo:
2009
Resumo:
Modern power networks incorporate communications and information technology infrastructure into the electrical power system to create a smart grid in terms of control and operation. The smart grid enables real-time communication and control between consumers and utility companies allowing suppliers to optimize energy usage based on price preference and system technical issues. The smart grid design aims to provide overall power system monitoring, create protection and control strategies to maintain system performance, stability and security. This dissertation contributed to the development of a unique and novel smart grid test-bed laboratory with integrated monitoring, protection and control systems. This test-bed was used as a platform to test the smart grid operational ideas developed here. The implementation of this system in the real-time software creates an environment for studying, implementing and verifying novel control and protection schemes developed in this dissertation. Phasor measurement techniques were developed using the available Data Acquisition (DAQ) devices in order to monitor all points in the power system in real time. This provides a practical view of system parameter changes, system abnormal conditions and its stability and security information system. These developments provide valuable measurements for technical power system operators in the energy control centers. Phasor Measurement technology is an excellent solution for improving system planning, operation and energy trading in addition to enabling advanced applications in Wide Area Monitoring, Protection and Control (WAMPAC). Moreover, a virtual protection system was developed and implemented in the smart grid laboratory with integrated functionality for wide area applications. Experiments and procedures were developed in the system in order to detect the system abnormal conditions and apply proper remedies to heal the system. A design for DC microgrid was developed to integrate it to the AC system with appropriate control capability. This system represents realistic hybrid AC/DC microgrids connectivity to the AC side to study the use of such architecture in system operation to help remedy system abnormal conditions. In addition, this dissertation explored the challenges and feasibility of the implementation of real-time system analysis features in order to monitor the system security and stability measures. These indices are measured experimentally during the operation of the developed hybrid AC/DC microgrids. Furthermore, a real-time optimal power flow system was implemented to optimally manage the power sharing between AC generators and DC side resources. A study relating to real-time energy management algorithm in hybrid microgrids was performed to evaluate the effects of using energy storage resources and their use in mitigating heavy load impacts on system stability and operational security.
Resumo:
Contingent Protection has grown to become an important trade restricting device. In the European Union, protection instruments like antidumping are used extensively. This paper analyses whether macroeconomic pressures may contribute to explain the variations in the intensity of antidumping protectionism in the EU. The empirical analysis uses count data models, applying various specification tests to derive the most appropriate specification. Our results suggest that the filing activity is inversely related to the macroeconomic conditions. Moreover, they confirm existing evidence for the US suggesting that domestic macroeconomic pressures are a more important determinant of contingent protection policy than external pressures.
Resumo:
Chaque année, le piratage mondial de la musique coûte plusieurs milliards de dollars en pertes économiques, pertes d’emplois et pertes de gains des travailleurs ainsi que la perte de millions de dollars en recettes fiscales. La plupart du piratage de la musique est dû à la croissance rapide et à la facilité des technologies actuelles pour la copie, le partage, la manipulation et la distribution de données musicales [Domingo, 2015], [Siwek, 2007]. Le tatouage des signaux sonores a été proposé pour protéger les droit des auteurs et pour permettre la localisation des instants où le signal sonore a été falsifié. Dans cette thèse, nous proposons d’utiliser la représentation parcimonieuse bio-inspirée par graphe de décharges (spikegramme), pour concevoir une nouvelle méthode permettant la localisation de la falsification dans les signaux sonores. Aussi, une nouvelle méthode de protection du droit d’auteur. Finalement, une nouvelle attaque perceptuelle, en utilisant le spikegramme, pour attaquer des systèmes de tatouage sonore. Nous proposons tout d’abord une technique de localisation des falsifications (‘tampering’) des signaux sonores. Pour cela nous combinons une méthode à spectre étendu modifié (‘modified spread spectrum’, MSS) avec une représentation parcimonieuse. Nous utilisons une technique de poursuite perceptive adaptée (perceptual marching pursuit, PMP [Hossein Najaf-Zadeh, 2008]) pour générer une représentation parcimonieuse (spikegramme) du signal sonore d’entrée qui est invariante au décalage temporel [E. C. Smith, 2006] et qui prend en compte les phénomènes de masquage tels qu’ils sont observés en audition. Un code d’authentification est inséré à l’intérieur des coefficients de la représentation en spikegramme. Puis ceux-ci sont combinés aux seuils de masquage. Le signal tatoué est resynthétisé à partir des coefficients modifiés, et le signal ainsi obtenu est transmis au décodeur. Au décodeur, pour identifier un segment falsifié du signal sonore, les codes d’authentification de tous les segments intacts sont analysés. Si les codes ne peuvent être détectés correctement, on sait qu’alors le segment aura été falsifié. Nous proposons de tatouer selon le principe à spectre étendu (appelé MSS) afin d’obtenir une grande capacité en nombre de bits de tatouage introduits. Dans les situations où il y a désynchronisation entre le codeur et le décodeur, notre méthode permet quand même de détecter des pièces falsifiées. Par rapport à l’état de l’art, notre approche a le taux d’erreur le plus bas pour ce qui est de détecter les pièces falsifiées. Nous avons utilisé le test de l’opinion moyenne (‘MOS’) pour mesurer la qualité des systèmes tatoués. Nous évaluons la méthode de tatouage semi-fragile par le taux d’erreur (nombre de bits erronés divisé par tous les bits soumis) suite à plusieurs attaques. Les résultats confirment la supériorité de notre approche pour la localisation des pièces falsifiées dans les signaux sonores tout en préservant la qualité des signaux. Ensuite nous proposons une nouvelle technique pour la protection des signaux sonores. Cette technique est basée sur la représentation par spikegrammes des signaux sonores et utilise deux dictionnaires (TDA pour Two-Dictionary Approach). Le spikegramme est utilisé pour coder le signal hôte en utilisant un dictionnaire de filtres gammatones. Pour le tatouage, nous utilisons deux dictionnaires différents qui sont sélectionnés en fonction du bit d’entrée à tatouer et du contenu du signal. Notre approche trouve les gammatones appropriés (appelés noyaux de tatouage) sur la base de la valeur du bit à tatouer, et incorpore les bits de tatouage dans la phase des gammatones du tatouage. De plus, il est montré que la TDA est libre d’erreur dans le cas d’aucune situation d’attaque. Il est démontré que la décorrélation des noyaux de tatouage permet la conception d’une méthode de tatouage sonore très robuste. Les expériences ont montré la meilleure robustesse pour la méthode proposée lorsque le signal tatoué est corrompu par une compression MP3 à 32 kbits par seconde avec une charge utile de 56.5 bps par rapport à plusieurs techniques récentes. De plus nous avons étudié la robustesse du tatouage lorsque les nouveaux codec USAC (Unified Audion and Speech Coding) à 24kbps sont utilisés. La charge utile est alors comprise entre 5 et 15 bps. Finalement, nous utilisons les spikegrammes pour proposer trois nouvelles méthodes d’attaques. Nous les comparons aux méthodes récentes d’attaques telles que 32 kbps MP3 et 24 kbps USAC. Ces attaques comprennent l’attaque par PMP, l’attaque par bruit inaudible et l’attaque de remplacement parcimonieuse. Dans le cas de l’attaque par PMP, le signal de tatouage est représenté et resynthétisé avec un spikegramme. Dans le cas de l’attaque par bruit inaudible, celui-ci est généré et ajouté aux coefficients du spikegramme. Dans le cas de l’attaque de remplacement parcimonieuse, dans chaque segment du signal, les caractéristiques spectro-temporelles du signal (les décharges temporelles ;‘time spikes’) se trouvent en utilisant le spikegramme et les spikes temporelles et similaires sont remplacés par une autre. Pour comparer l’efficacité des attaques proposées, nous les comparons au décodeur du tatouage à spectre étendu. Il est démontré que l’attaque par remplacement parcimonieux réduit la corrélation normalisée du décodeur de spectre étendu avec un plus grand facteur par rapport à la situation où le décodeur de spectre étendu est attaqué par la transformation MP3 (32 kbps) et 24 kbps USAC.
Resumo:
Data sharing between organizations through interoperability initiatives involving multiple information systems is fundamental to promote the collaboration and integration of services. However, in terms of data, the considerable increase in its exposure to additional risks, require a special attention to issues related to privacy of these data. For the Portuguese healthcare sector, where the sharing of health data is, nowadays, a reality at national level, data privacy is a central issue, which needs solutions according to the agreed level of interoperability between organizations. This context led the authors to study the factors with influence on data privacy in a context of interoperability, through a qualitative and interpretative research, based on the method of case study. This article presents the final results of the research that successfully identifies 10 subdomains of factors with influence on data privacy, which should be the basis for the development of a joint protection program, targeted at issues associated with data privacy.
Resumo:
The International Seabed Authority (ISA) regulates the activities related with the exploration and exploitation of seabed mineral resources in the Area, which are considered as the "common heritage of mankind" under the United Nations Convention on the Law of the Sea.The ISA has also the mandate to ensure the protection of the marine environment.The development of good practices for the annual reporting and data submission by Contractors is crucial for the ISA to comply with the sustainable development of the mineral marine resources. In 2015,the ISA issued a new template for reporting on exploration activities, which includes the definition of the format for all geophysical, geological and environmental data to be collected and analysed during exploration. The availability of reliable data contributes to improve the assessment of the ISA on the activities in the Area while promoting transparency, which is considered as a major principle of industry bestpractices.
Resumo:
This dissertation looks at three widely accepted assumptions about how the patent system works: patent documents disclose inventions; this disclosure happens quickly, and patent owners are able to enforce patents. The first chapter estimates the effect of stronger trade secret protection on the number of patented innovations. When firms find it easier to protect business information, there is less need for patent protection, and accordingly less need for the disclosure of technical information that is required by patent law. The novel finding is that when it is easier to keep innovations, there is not only a reduction in the number of patents but also a sizeable reduction in disclosed knowledge per patent. The chapter then shows how this endogeneity of the amount of knowledge per patent can affect the measurement of innovation using patent data. The second chapter develops a game-theoretic model to study how the introduction of fee-shifting in US patent litigation would influence firms’ patenting propensities. When the defeated party to a lawsuit has to bear not only their own cost but also the legal expenditure of the winning party, manufacturing firms in the model unambiguously reduce patenting, with small firms affected the most. For fee-shifting to have the same effect as in Europe, the US legal system would require shifting of a much smaller share of fees. Lessons from European patent litigation may, therefore, have only limited applicability in the US case. The third chapter contains a theoretical analysis of the influence of delayed disclosure of patent applications by the patent office. Such a delay is a feature of most patent systems around the world but has so far not attracted analytical scrutiny. This delay may give firms various kinds of strategic (non-)disclosure incentives when they are competing for more than a single innovation.
Resumo:
In digital markets personal information is pervasively collected by firms. In the first chapter I study data ownership and product customization when there is exclusive access to non rival but excludable data about consumer preferences. I show that an incumbent firm does not have an incentive to sell an exclusively held dataset with a rival firm, but instead it has an incentive to trade a customizing technology with the other firm. In the second chapter I investigate the effects of consumer information on the intensity of competition. In a two dimensional model of product differentiation, firms use information on preferences to practice price discrimination. I contrast a full privacy and a no privacy benchmark with a regime in which firms are able to target consumers only partially. When data is partially informative, firms are always better-off with price discrimination and an exclusive access to user data is not necessarily a competition policy concern. From a consumer protection perspective, the policy recommendation is that the regulator should promote either no privacy or full privacy. In the third chapter I introduce a data broker that observes either only one or both dimensions of consumer information and sells this data to competing firms for price discrimination purposes. When the seller exogenously holds a partially informative dataset, an exclusive allocation arises. Instead, when the dataset held is fully informative, the data broker trades information non exclusively but each competitor acquires consumer data on a different dimension. When data collection is made endogenous, non exclusivity is robust if collection costs are not too high. The competition policy suggestion is that exclusivity should not be banned per se, but it is data differentiation in equilibrium that rises market power in competitive markets. Upstream competition is sufficient to ensure that both firms get access to consumer information.
Resumo:
The fast development of Information Communication Technologies (ICT) offers new opportunities to realize future smart cities. To understand, manage and forecast the city's behavior, it is necessary the analysis of different kinds of data from the most varied dataset acquisition systems. The aim of this research activity in the framework of Data Science and Complex Systems Physics is to provide stakeholders with new knowledge tools to improve the sustainability of mobility demand in future cities. Under this perspective, the governance of mobility demand generated by large tourist flows is becoming a vital issue for the quality of life in Italian cities' historical centers, which will worsen in the next future due to the continuous globalization process. Another critical theme is sustainable mobility, which aims to reduce private transportation means in the cities and improve multimodal mobility. We analyze the statistical properties of urban mobility of Venice, Rimini, and Bologna by using different datasets provided by companies and local authorities. We develop algorithms and tools for cartography extraction, trips reconstruction, multimodality classification, and mobility simulation. We show the existence of characteristic mobility paths and statistical properties depending on transport means and user's kinds. Finally, we use our results to model and simulate the overall behavior of the cars moving in the Emilia Romagna Region and the pedestrians moving in Venice with software able to replicate in silico the demand for mobility and its dynamic.
Resumo:
The internet and digital technologies revolutionized the economy. Regulating the digital market has become a priority for the European Union. While promoting innovation and development, EU institutions must assure that the digital market maintains a competitive structure. Among the numerous elements characterizing the digital sector, users’ data are particularly important. Digital services are centered around personal data, the accumulation of which contributed to the centralization of market power in the hands of a few large providers. As a result, data-driven mergers and data-related abuses gained a central role for the purposes of EU antitrust enforcement. In light of these considerations, this work aims at assessing whether EU competition law is well-suited to address data-driven mergers and data-related abuses of dominance. These conducts are of crucial importance to the maintenance of competition in the digital sector, insofar as the accumulation of users’ data constitutes a fundamental competitive advantage. To begin with, part 1 addresses the specific features of the digital market and their impact on the definition of the relevant market and the assessment of dominance by antitrust authorities. Secondly, part 2 analyzes the EU’s case law on data-driven mergers to verify if merger control is well-suited to address these concentrations. Thirdly, part 3 discusses abuses of dominance in the phase of data collection and the legal frameworks applicable to these conducts. Fourthly, part 4 focuses on access to “essential” datasets and the indirect effects of anticompetitive conducts on rivals’ ability to access users’ information. Finally, Part 5 discusses differential pricing practices implemented online and based on personal data. As it will be assessed, the combination of an efficient competition law enforcement and the auspicial adoption of a specific regulation seems to be the best solution to face the challenges raised by “data-related dominance”.
Resumo:
La disciplina del pareggio di bilancio è in continua evoluzione, soprattutto a fronte delle nuove esigenze finanziarie per contrastare la pandemia. Questo elaborato, studiando la governance economica strutturata dopo la crisi dei debiti, le derivanti scelte italiane in materia di costituzionalizzazione del pareggio di bilancio e le conseguenze sulle autonomie locali, dimostra come il sistema di gestione delle finanze pubbliche a livello comunitario si stia completando, generando un rapporto normativo ciclico tra il livello europeo e quello locale. Ne è emersa una conflittualità tra le Regioni e lo Stato, che è analizzata al fine di comprendere la giustiziabilità costituzionale del pareggio di bilancio, osservando le esigenze di bilanciamento tra l’equilibrio finanziario e la tutela dei diritti sociali. La Corte Costituzionale ha recentemente conferito, in via giurisprudenziale, alla Corte dei Conti la potestà di svolgere un controllo diretto di costituzionalità del rispetto dell’equilibrio di bilancio degli enti nazionali e territoriali. Particolare attenzione viene data, poi, a seguito degli effetti della pandemia da Covid-19 sui bilanci degli Stati. A fronte della crisi pandemica, per la prima volta dall’approvazione del TSCG, la Commissione ha attivato la clausola di salvaguardia generale per sospendere il Patto di Stabilità (c.d. escape clause). Questa clausola ha permesso ai Paesi di ricorrere agli scostamenti di bilancio. Viene infine analizzato il piano “Next Generation EU”, che centralizza i prestiti verso gli Stati membri nel bilancio dell’Unione ed attinge dal mercato dei capitali le risorse necessarie per finanziare un totale di 750 miliardi, attraverso l’emissione di obbligazioni “Eu Bills”. Per la prima volta nella storia, l’Unione, nelle parole della Commissione, agisce sui mercati come se fosse uno Stato. La portata straordinaria del NGEU, con l’emissione di titoli europei, porta ad una sostanziale mutualizzazione dei debiti ed appare come un passo fondamentale verso il completamento dell’UEM e di un sistema federale.
Resumo:
Our cities are constantly evolving, and the necessity to improve the condition and safety of the urban infrastructures is fundamental. However, on the roads, the specific needs of cyclists and pedestrians are often neglected. The Vulnerable Road Users (VRUs), among whom cyclists and pedestrians are, rarely benefit from the most innovative safety measures. Inspired by playgrounds and aiming to reduce VRUs injuries, the Impact-Absorbing Pavements (IAP) developed as novel sidewalks, and bike lanes surface layers may help decrease injuries, fatalities, and the related societal costs. To achieve this goal, the End-of-Life Tyres (ELTs) crumb rubber (CR) is used as a primary resource, bringing its elastic properties into the surface layer. The thesis is divided into five main chapters. The first concerns the formulation and the definition of a feasible mix. The second explores the mechanical and environmental properties in detail, and the ageing effect is also assessed. The third describes the modelling of the material to simulate accidents and measure the injury reduction, especially on the head. The fourth chapter is reserved for the field trial. The last gives some perspectives on the research and proposes a way to optimize and improve the data and results collected during the doctoral research. It was observed that the specimens made with cold protocol have noticeable performances and reduce the overall carbon footprint impact of this material. The material modelling and the accident simulation proved the performance of the IAP against head injuries, and the field trial confirmed the good results obtained in the laboratory for the cold-made material. Finally, the outcomes of this thesis opened many prospective to the IAP development, such as the use of a plant-based binder or recycled aggregates and gave a positive prospect of an innovative material to the urban road infrastructures.
Resumo:
Following the approval of the 2030 Agenda for Sustainable Development in 2015, sustainability became a hotly debated topic. In order to build a better and more sustainable future by 2030, this agenda addressed several global issues, including inequality, climate change, peace, and justice, in the form of 17 Sustainable Development Goals (SDGs), that should be understood and pursued by nations, corporations, institutions, and individuals. In this thesis, we researched how to exploit and integrate Human-Computer Interaction (HCI) and Data Visualization to promote knowledge and awareness about SDG 8, which wants to encourage lasting, inclusive, and sustainable economic growth, full and productive employment, and decent work for all. In particular, we focused on three targets: green economy, sustainable tourism, employment, decent work for all, and social protection. The primary goal of this research is to determine whether HCI approaches may be used to create and validate interactive data visualization that can serve as helpful decision-making aids for specific groups and raise their knowledge of public-interest issues. To accomplish this goal, we analyzed four case studies. In the first two, we wanted to promote knowledge and awareness about green economy issues: we investigated the Human-Building Interaction inside a Smart Campus and the dematerialization process inside a University. In the third, we focused on smart tourism, investigating the relationship between locals and tourists to create meaningful connections and promote more sustainable tourism. In the fourth, we explored the industry context to highlight sustainability policies inside well-known companies. This research focuses on the hypothesis that interactive data visualization tools can make communities aware of sustainability aspects related to SDG8 and its targets. The research questions addressed are two: "how to promote awareness about SDG8 and its targets through interactive data visualizations?" and "to what extent are these interactive data visualizations effective?".