774 resultados para Information privacy Framework


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article is concerned with the liability of search engines for algorithmically produced search suggestions, such as through Google’s ‘autocomplete’ function. Liability in this context may arise when automatically generated associations have an offensive or defamatory meaning, or may even induce infringement of intellectual property rights. The increasing number of cases that have been brought before courts all over the world puts forward questions on the conflict of fundamental freedoms of speech and access to information on the one hand, and personality rights of individuals— under a broader right of informational self-determination—on the other. In the light of the recent judgment of the Court of Justice of the European Union (EU) in Google Spain v AEPD, this article concludes that many requests for removal of suggestions including private individuals’ information will be successful on the basis of EU data protection law, even absent prejudice to the person concerned.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND: Using continuing professional development (CPD) as part of the revalidation of pharmacy professionals has been proposed in the UK but not implemented. We developed a CPD Outcomes Framework (‘the framework’) for scoring CPD records, where the score range was -100 to +150 based on demonstrable relevance and impact of the CPD on practice. OBJECTIVE: This exploratory study aimed to test the outcome of training people to use the framework, through distance-learning material (active intervention), by comparing CPD scores before and after training. SETTING: Pharmacy professionals were recruited in the UK in Reading, Banbury, Southampton, Kingston-upon-Thames and Guildford in 2009. METHOD: We conducted a randomised, double-blinded, parallel-group, before and after study. The control group simply received information on new CPD requirements through the post; the active intervention group also received the framework and associated training. Altogether 48 participants (25 control, 23 active) completed the study. All participants submitted CPD records to the research team before and after receiving the posted resources. The records (n=226) were scored blindly by the researchers using the framework. A subgroup of CPD records (n=96) submitted first (before-stage) and rewritten (after-stage) were analysed separately. MAIN OUTCOME MEASURE: Scores for CPD records received before and after distributing group-dependent material through the post. RESULTS: Using a linear-regression model both analyses found an increase in CPD scores in favour of the active intervention group. For the complete set of records, the effect was a mean difference of 9.9 (95% CI = 0.4 to 19.3), p-value = 0.04. For the subgroup of rewritten records, the effect was a mean difference of 17.3 (95% CI = 5.6 to 28.9), p-value = 0.0048. CONCLUSION: The intervention improved participants’ CPD behaviour. Training pharmacy professionals to use the framework resulted in better CPD activities and CPD records, potentially helpful for revalidation of pharmacy professionals. IMPACT: • Using a bespoke Continuing Professional Development outcomes framework improves the value of pharmacy professionals’ CPD activities and CPD records, with the potential to improve patient care. • The CPD outcomes framework could be helpful to pharmacy professionals internationally who want to improve the quality of their CPD activities and CPD records. • Regulators and officials across Europe and beyond can assess the suitability of the CPD outcomes framework for use in pharmacy CPD and revalidation in their own setting.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background  Access to, and the use of, information and communication technology (ICT) is increasingly becoming a vital component of mainstream life. First-order (e.g. time and money) and second-order factors (e.g. beliefs of staff members) affect the use of ICT in different contexts. It is timely to investigate what these factors may be in the context of service provision for adults with intellectual disabilities given the role ICT could play in facilitating communication and access to information and opportunities as suggested in Valuing People. Method  Taking a qualitative approach, nine day service sites within one organization were visited over a period of 6 months to observe ICT-related practice and seek the views of staff members working with adults with intellectual disabilities. All day services were equipped with modern ICT equipment including computers, digital cameras, Internet connections and related peripherals. Results  Staff members reported time, training and budget as significant first-order factors. Organizational culture and beliefs about the suitability of technology for older or less able service users were the striking second-order factors mentioned. Despite similar levels of equipment, support and training, ICT use had developed in very different ways across sites. Conclusion  The provision of ICT equipment and training is not sufficient to ensure their use; the beliefs of staff members and organizational culture of sites play a substantial role in how ICT is used with and by service users. Activity theory provides a useful framework for considering how first- and second-order factors are related. Staff members need to be given clear information about the broader purpose of activities in day services, especially in relation to the lifelong learning agenda, in order to see the relevance and usefulness of ICT resources for all service users.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Initialising the ocean internal variability for decadal predictability studies is a new area of research and a variety of ad hoc methods are currently proposed. In this study, we explore how nudging with sea surface temperature (SST) and salinity (SSS) can reconstruct the three-dimensional variability of the ocean in a perfect model framework. This approach builds on the hypothesis that oceanic processes themselves will transport the surface information into the ocean interior as seen in ocean-only simulations. Five nudged simulations are designed to reconstruct a 150 years “target” simulation, defined as a portion of a long control simulation. The nudged simulations differ by the variables restored to, SST or SST + SSS, and by the area where the nudging is applied. The strength of the heat flux feedback is diagnosed from observations and the restoring coefficients for SSS use the same time-scale. We observed that this choice prevents spurious convection at high latitudes and near sea-ice border when nudging both SST and SSS. In the tropics, nudging the SST is enough to reconstruct the tropical atmosphere circulation and the associated dynamical and thermodynamical impacts on the underlying ocean. In the tropical Pacific Ocean, the profiles for temperature show a significant correlation from the surface down to 2,000 m, due to dynamical adjustment of the isopycnals. At mid-to-high latitudes, SSS nudging is required to reconstruct both the temperature and the salinity below the seasonal thermocline. This is particularly true in the North Atlantic where adding SSS nudging enables to reconstruct the deep convection regions of the target. By initiating a previously documented 20-year cycle of the model, the SST + SSS nudging is also able to reproduce most of the AMOC variations, a key source of decadal predictability. Reconstruction at depth does not significantly improve with amount of time spent nudging and the efficiency of the surface nudging rather depends on the period/events considered. The joint SST + SSS nudging applied everywhere is the most efficient approach. It ensures that the right water masses are formed at the right surface density, the subsequent circulation, subduction and deep convection further transporting them at depth. The results of this study underline the potential key role of SSS for decadal predictability and further make the case for sustained large-scale observations of this field.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

General principles of climate change adaptation for biodiversity have been formulated, but do not help prioritize actions. This is inhibiting their integration into conservation planning. We address this need with a decision framework that identifies and prioritizes actions to increase the adaptive capacity of species. The framework classifies species according to their current distribution and projected future climate space, as a basis for selecting appropriate decision trees. Decisions rely primarily on expert opinion, with additional information from quantitative models, where data are available. The framework considers in-situ management, followed by interventions at the landscape scale and finally translocation or ex-situ conservation. Synthesis and applications: From eight case studies, the key interventions identified for integrating climate change adaptation into conservation planning were local management and expansion of sites. We anticipate that, in combination with consideration of socio-economic and local factors, the decision framework will be a useful tool for conservation and natural resource managers to integrate adaptation measures into conservation plans.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study focuses on regional entrepreneurial ecosystems and offers a complex model of start-ups, Regional Entrepreneurship and Development Index (REDI) and six domains of the entrepreneurial ecosystem (culture, formal institutions, infrastructure and amenities, IT, Melting Pot and demand). Altogether they capture the contextual features of socioeconomic, institutional and information environment in cities. To explain variations in entrepreneurship in a cross-section of 70 European cities, we utilize exploratory factor analysis and structural equation modelling for regional systems of entrepreneurship using individual perception surveys by Eurostat and the REDI. This study supports policymakers and scholars in development of new policies conducive to regional systems of innovation and entrepreneurship and serves as a basis for future research on urban entrepreneurial ecosystems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article presents an experimental scalable message driven IoT and its security architecture based on Decentralized Information Flow Control. The system uses a gateway that exports SoA (REST) interfaces to the internet simplifying external applications whereas uses DIFC and asynchronous messaging within the home environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We discuss the connection between information and copula theories by showing that a copula can be employed to decompose the information content of a multivariate distribution into marginal and dependence components, with the latter quantified by the mutual information. We define the information excess as a measure of deviation from a maximum-entropy distribution. The idea of marginal invariant dependence measures is also discussed and used to show that empirical linear correlation underestimates the amplitude of the actual correlation in the case of non-Gaussian marginals. The mutual information is shown to provide an upper bound for the asymptotic empirical log-likelihood of a copula. An analytical expression for the information excess of T-copulas is provided, allowing for simple model identification within this family. We illustrate the framework in a financial data set. Copyright (C) EPLA, 2009

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Librarians must continue their traditional roles as privacy rights activists and intellectual freedom upholders into the digital age, and across electronic information sources, including social media fora. Social media is quickly becoming a major source of information and center for information seeking, and librarians have an opportunity to promote and help shape social media policies that protect users’ privacy and assure that users can seek information without inhibition. One way librarians can be involved in the promotion of online privacy is by joining the social media user rights movement and advocating terms of use agreements that protect information seekers that follow the "Privacy by Design" model created by Ann Cavoukian, Ph.D.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper introduces a corrected test statistic for testing seasonal unit roots when residuals contain serial correlations, based on the HEGY test proposed by Hylleberg,Engle, Granger and Yoo (1990). The serial correlations in the residuals of test regressionare accommodated by making corrections to the commonly used HEGY t statistics. Theasymptotic distributions of the corrected t statistics are free from nuisance parameters.The size and power properties of the corrected statistics for quarterly and montly data are investigated. Based on our simulations, the corrected statistics for monthly data havemore power compared with the commonly used HEGY test statistics, but they also have size distortions when there are strong negative seasonal correlations in the residuals.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Some 50% of the people in the world live in rural areas, often under harsh conditions and in poverty. The need for knowledge of how to improve living conditions is well documented. In response to this need, new knowledge of how to improve living conditions in rural areas and elsewhere is continuously being developed by researchers and practitioners around the world. People in rural areas, in particular, would certainly benefit from being able to share relevant knowledge with each other, as well as with stakeholders (e.g. researchers) and other organizations (e.g. NGOs). Central to knowledge management is the idea of knowledge sharing. This study is based on the assumption that knowledge management can support sustainable development in rural and remote regions. It aims to present a framework for knowledge management in sustainable rural development, and an inventory of existing frameworks for that. The study is interpretive, with interviews as the primary source for the inventory of stakeholders, knowledge categories and Information and Communications Technology (ICT) infrastructure. For the inventory of frameworks, a literature study was carried out. The result is a categorization of the stakeholders who act as producers and beneficiaries of explicit and indigenous development knowledge. Stakeholders are local government, local population, academia, NGOs, civil society and donor agencies. Furthermore, the study presents a categorization of the development knowledge produced by the stakeholders together with specifications for the existing ICT infrastructure. Rural development categories found are research, funding, agriculture, ICT, gender, institutional development, local infrastructure development, and marketing & enterprise. Finally, a compiled framework is presented, and it is based on ten existing frameworks for rural development that were found in the literature study, and the empirical findings of the Gilgit-Baltistan case. Our proposed framework is divided in four levels where level one consists of the identified stakeholders, level two consists of rural development categories, level three of the knowledge management system and level four of sustainable rural development based on the levels below. In the proposed framework we claim that the sustainability of rural development can be achieved through a knowledge society in which knowledge of the rural development process is shared among all relevant stakeholders.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we present a framework to be used for evaluation of Information and Communication Technology for Development (ICT4D) projects. The framework is based on Sen´s notion of development as freedom where human capabilities and functionings are seen as key aspects to development. Sen´s capability approach presents an alternative way of seeing and evaluating development (alternative to more traditional ways of measuring development). The approach is based on expanding freedoms, or eliminating unfreedoms, for people so that they can live a life that they have reason to value. Even though Sen is referenced a lot in ICT4D literature the analysis rarely goes further then stating that Sen presents an alternative to traditional ways of development. Reasons can be that the capability approach does not specifically mention technology, in addition to the lack of guidelines presented by Sen on how to use the framework. The aim of this paper is to operationalize the evaluation process and to include a clear role for technology in Sen´s capability framework. The framework is validated with a case on distance education from Bangladesh. 

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The behaviours of autonomous agents may deviate from those deemed to be for the good of the societal systems of which they are a part. Norms have therefore been proposed as a means to regulate agent behaviours in open and dynamic systems, and may be encoded in electronic contracts in order to specify the obliged, permitted and prohibited behaviours of agents that are signatories to such contracts. Enactment and management of electronic contracts thus enables the use of regulatory mechanisms to ensure that agent behaviours comply with the encoded norms. To facilitate such mechanisms requires monitoring in order to detect and explain violation of norms. In this paper we propose a framework for monitoring that is to be implemented and integrated into a suite of contract enactment and management tools. The framework adopts a non-intrusive approach to monitoring, whereby the states of a contract with respect to its contained norms can be inferred on the basis of messages exchanged. Specifically, the framework deploys agents that observe messages sent between contract signatories, where these messages correspond to agent behaviours and therefore indicate whether norms are, or are in danger of, being violated.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We live in a world full of social media and portable technology that allows for the effortless access to, and sharing of, information. While this constant connection can be viewed as a benefit by some, there have been recent, sometimes embarrassing, instances throughout the world that show just how quickly any expectation of privacy can be destroyed. From pictures of poorly dressed shoppers at a grocery store to customers recording interactions with their servers at restaurants, the internet is full of media (all with the potential to go viral) created and posted without consent of all parties captured. This risk to privacy is not just limited to retail and restaurants, as being in any situation amongst people puts you at risk, including being in an academic classroom. Anyone providing in-class instruction, be they professor or librarian, can be at risk for this type of violation of privacy. In addition, the students in the class are also at risk for being unwittingly captured by their classmates. To combat this, colleges and universities are providing recommendations to faculty regarding this issue, such as including suggested syllabus statements about classroom recording by students. In some instances, colleges and universities have instituted formal policies with strict penalties for violators. An overview of current privacy law as it relates to an academic setting is discussed as well as recent, newsworthy instances of student recording in the classroom and the resulting controversies. Additionally, there is a discussion highlighting various recommendations and formal policies that have been issued and adopted by colleges and universities around the country. Finally, advice is offered about what librarians can do to educate students, faculty, and staff about the privacy rights of others and the potential harm that could come from posting to social media and the open web images and video of others without their consent.