991 resultados para Protection of personal information


Relevância:

100.00% 100.00%

Publicador:

Resumo:

A microgrid provides economical and reliable power to customers by integrating distributed resources more effectively. Islanded operation enables a continuous power supply for loads during a major grid disturbance. Reliability of a microgrid can be further increased by forming a mesh configuration. However, the protection of mesh microgrids is a challenging task. In this paper, protection schemes are discussed using current differential protection of a microgrid. The protection challenges associated with bi-directional power flow, meshed configuration, changing fault current level due to intermittent nature of DGs and reduced fault current level in an islanded mode are considered in proposing the protection solutions. Relay setting criterion and current transformer (CT) selection guidelines are also discussed. The results are verified using MATLAB calculations and PSCAD simulations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Privacy issues have hindered the evolution of e-health since its emergence. Patients demand better solutions for the protection of private information. Health professionals demand open access to patient health records. Existing e-health systems find it difficult to fulfill these competing requirements. In this paper, we present an information accountability framework (IAF) for e-health systems. The IAF is intended to address privacy issues and their competing concerns related to e-health. Capabilities of the IAF adhere to information accountability principles and e-health requirements. Policy representation and policy reasoning are key capabilities introduced in the IAF. We investigate how these capabilities are feasible using Semantic Web technologies. We discuss with the use of a case scenario, how we can represent the different types of policies in the IAF using the Open Digital Rights Language (ODRL).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

language (such as C++ and Java). The model used allows to insert watermarks on three “orthogonal” levels. For the first level, watermarks are injected into objects. The second level watermarking is used to select proper variants of the source code. The third level uses transition function that can be used to generate copies with different functionalities. Generic watermarking schemes were presented and their security discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A new era of visible and sharable electricity information is emerging. Where eco-feedback is installed, households can now visualise many aspects of their energy consumption and share this information with others through Internet platforms such as social media. Despite providing users with many affordances, eco-feedback information can make public previously private actions from within the intimate setting of the family home. This paper represents a study focussing specifically on the privacy aspects of nascent ways for viewing and sharing this new stream of personal information. It explores the nuances of privacy related to eco-feedback both within and beyond the family home. While electricity consumption information may not be considered private itself, the household practices which eco-feedback systems makes visible may be private. We show that breaches of privacy can occur in unexpected ways and have the potential to cause distress. The paper concludes with some suggestions for how to realise the benefits of sharing energy consumption information whist effectively maintaining individuals’ conceptions of adequate privacy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This tutorial primarily focuses on the implementation of Information Accountability (IA) protocols defined in an Information Accountability Framework (IAF) in eHealth systems. Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well-informed decisions and provide quality care. This conflict is evident in the review of Australia's PCEHR system and in recent studies of patient control of access to their eHealth information. In order to balance these requirements, the use of an Information Accountability Framework devised for eHealth systems has been proposed. Through the use of IA protocols, so-called Accountable-eHealth systems (AeH) create an eHealth environment where health information is available to the right person at the right time without rigid barriers whilst empowering the consumers with information control and transparency. In this half-day tutorial, we will discuss and describe the technical challenges surrounding the implementation of the IAF protocols into existing eHealth systems and demonstrate their use. The functionality of the protocols and AeH systems will be demonstrated, and an example of the implementation of the IAF protocols into an existing eHealth system will be presented and discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cognitive impairments of attention, memory and executive functions are a fundamental feature of the pathophysiology of schizophrenia. The neurophysiological and neurochemical changes in the auditory cortex are shown to underlie cognitive impairmentsin schizophrenia patients. Functional state of the neural substrate of auditory information processing could be objectively and non-invasively probed with auditory event-related potentials (ERPs) and event- related fields (ERFs). In the current work, we explored the neurochemical effect on the neural origins of auditory information processing in relation to schizophrenia. By means of ERPs/ERFs we aimed to determine how neural substrates of auditory information processing are modulated by antipsychotic medication in schizophrenia spectrum patients (Studies I, II) and by neuropharmacological challenges in healthy human subjects (Studies III, IV). First, with auditory ERPs we investigated the effects of olanzapine (Study I) and risperidone (Study II) in a group of patients with schizophrenia spectrum disorders. After 2 and 4 weeks of treatment, olanzapine has no significant effects on mismatch negativity(MMN) and P300, which, as it has been suggested, respectively reflect preattentive and attention-dependent information processing. After 2 weeks of treatment, risperidone has no significant effect on P300, however risperidone reduces P200 amplitude. This latter effect of risperidone on neural resources responsible for P200 generation could be partly explained through the action of dopamine. Subsequently, we used simultaneous EEG/MEG to investigate the effects of memantine (Study III) and methylphenidate (Study IV) in healthy subjects. We found that memantine modulates MMN response without changing other ERP components. This could be interpreted as being due to the possible influence of memantine through the NMDA receptors on auditory change- detection mechanism, with processing of auditory stimuli remaining otherwise unchanged. Further, we found that methylphenidate does not modulate the MMN response. This finding could indicate no association between catecholaminergic activities and electrophysiological measures of preattentive auditory discrimination processes reflected in the MMN. However, methylphenidate decreases the P200 amplitudes. This could be interpreted as a modulation of auditory information processing reflected in P200 by dopaminergic and noradrenergic systems. Taken together, our set of studies indicates a complex pattern of neurochemical influences produced by the antipsychotic drugs in the neural substrate of auditory information processing in patients with schizophrenia spectrum disorders and by the pharmacological challenges in healthy subjects studied with ERPs and ERFs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Urbanization leads to irreversible land-use change, which has ecological consequences such as the loss and fragmentation of green areas, and structural and functional changes in terrestrial and aquatic ecosystems. These consequences diminish ecosystem services important for human populations living in urban areas. All this results in a conflict situation: how to simultaneously meet the needs of city growth and the principles of sustainable development, and especially conserve important green areas within and around built-up areas? Urban planners and decisionmakers have an important role in this, since they must use the ecological information mainly from species and biotope inventories and biodiversity impact assessments in determining the conservation values of green areas. The main aim of this thesis was to study the use of ecological information in the urban land-use planning and decisionmaking process in the Helsinki Metropolitan Area, Finland. At first, the literature on ecological-social systems linkages related to urban planning was reviewed. Based on the review, a theoretical and conceptual framework for the research on Finnish urban setting was adapted. Secondly, factors determining the importance and effectiveness of incorporation of ecological information into the urban planning process, and the challenges related to the use of ecological information were studied. Thirdly, the importance and use of Local Ecological Knowledge in urban planning were investigated. Then, factors determining the consideration of urban green areas and related ecological information in political land-use decisionmaking were studied. Finally, in a case study illustrating the above considerations, the importance of urban stream ecosystems in the land-use planning was investigated. This thesis demonstrated that although there are several challenges in using ecological information effectively, it is considered as an increasingly important part of the basic information used in urban planning and decisionmaking process. The basic determinants for this are the recent changes in environmental legislation, but also the increasing appreciation of green areas and their conservation values by all the stakeholders. In addition, Local Ecological Knowledge in its several forms can be a source of ecological information for planners if incorporated effectively into the process. This study also showed that rare or endangered species and biotopes, and related ecological information receive priority in the urban planning process and usually pass through the decisionmaking system. Furthermore, the stream Rekolanoja case indicates that planners and residents see the value of urban stream ecosystem as increasingly important for the local health and social values, such as recreation and stress relief.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of social networking has exploded, with millions of people using various web- and mobile-based services around the world. This increase in social networking use has led to user anxiety related to privacy and the unauthorised exposure of personal information. Large-scale sharing in virtual spaces means that researchers, designers and developers now need to re-consider the issues and challenges of maintaining privacy when using social networking services. This paper provides a comprehensive survey of the current state-of-the-art privacy in social networks for both desktop and mobile uses and devices from various architectural vantage points. The survey will assist researchers and analysts in academia and industry to move towards mitigating many of the privacy issues in social networks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

"The Protection of Traditional Knowledge Associated with Genetic Resources: The Role of Databases and Registers" ABSTRACT Yovana Reyes Tagle The misappropriation of TK has sparked a search for national and international laws to govern the use of indigenous peoples knowledge and protection against its commercial exploitation. There is a widespread perception that biopiracy or illegal access to genetic resources and associated traditional knowledge (TK) continues despite national and regional efforts to address this concern. The purpose of this research is to address the question of how documentation of TK through databases and registers could protect TK, in light of indigenous peoples increasing demands to control their knowledge and benefit from its use. Throughout the international debate over the protection of TK, various options have been brought up and discussed. At its core, the discussion over the legal protection of TK comes down to these issues: 1) The doctrinal question: What is protection of TK? 2) The methodological question: How can protection of TK be achieved? 3) The legal question: What should be protected? And 4) The policy questions: Who has rights and how should they be implemented? What kind of rights should indigenous peoples have over their TK? What are the central concerns the TK databases want to solve? The acceptance of TK databases and registers may bring with it both opportunities and dangers. How can the rights of indigenous peoples over their documented knowledge be assured? Documentation of TK was envisaged as a means to protect TK, but there are concerns about how documented TK can be protected from misappropriation. The methodology used in this research seeks to contribute to the understanding of the protection of TK. The steps taken in this research attempt to describe and to explain a) what has been done to protect TK through databases and registers, b) how this protection is taking place, and c) why the establishment of TK databases can or cannot be useful for the protection of TK. The selected case studies (Peru and Venezuela) seek to illustrate the complexity and multidisciplinary nature of the establishment of TK databases, which entail not only legal but also political, socio-economic and cultural issues. The study offers some conclusions and recommendations that have emerged after reviewing the national experiences, international instruments, work of international organizations, and indigenous peoples perspectives. This thesis concludes that if TK is to be protected from disclosure and unauthorized use, confidential databases are required. Finally, the TK database strategy needs to be strengthened by the legal protection of the TK itself.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A model of the information and material activities that comprise the overall construction process is presented, using the SADT activity modelling methodology. The basic model is further refined into a number of generic information handling activities such as creation of new information, information search and retrieval, information distribution and person-to-person communication. The viewpoint could be described as information logistics. This model is then combined with a more traditional building process model, consisting of phases such as design and construction. The resulting two-dimensional matrix can be used for positioning different types of generic IT-tools or construction specific applications. The model can thus provide a starting point for a discussion of the application of information and communication technology in construction and for measurements of the impacts of IT on the overall process and its related costs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Service researchers have repeatedly claimed that firms should acquire customer information in order to develop services that fit customer needs. Despite this, studies that would concentrate on the actual use of customer information in service development are lacking. The present study fulfils this research gap by investigating information use during a service development process. It demonstrates that use is not a straightforward task that automatically follows the acquisition of customer information. In fact, out of the six identified types of use, four represent non usage of customer information. Hence, the study demonstrates that the acquisition of customer information does not guarantee that the information will actually be used in development. The current study used an ethnographic approach. Consequently, the study was conducted in the field in real time over an extensive period of 13 months. Participant observation allowed direct access to the investigated phenomenon, i.e. the different types of use by the observed development project members were captured while they emerged. In addition, interviews, informal discussions and internal documents were used to gather data. A development process of a bank’s website constituted the empirical context of the investigation. This ethnography brings novel insights to both academia and practice. It critically questions the traditional focus on the firm’s acquisition of customer information and suggests that this focus ought to be expanded to the actual use of customer information. What is the point in acquiring costly customer information if it is not used in the development? Based on the findings of this study, a holistic view on customer information, “information in use” is generated. This view extends the traditional view of customer information in three ways: the source, timing and form of data collection. First, the study showed that the customer information can come explicitly from the customer, from speculation among the developers or it can already exist implicitly. Prior research has mainly focused on the customer as the information provider and the explicit source to turn to for information. Second, the study identified that the used and non-used customer information was acquired both previously, and currently within the time frame of the focal development process, as well as potentially in the future. Prior research has primarily focused on the currently acquired customer information, i.e. within the timeframe of the development process. Third, the used and non-used customer information was both formally and informally acquired. In prior research a large number of sophisticated formal methods have been suggested for the acquisition of customer information to be used in development. By focusing on “information in use”, new knowledge on types of customer information that are actually used was generated. For example, the findings show that the formal customer information acquired during the development process is used less than customer information already existent within the firm. With this knowledge at hand, better methods to capture this more usable customer information can be developed. Moreover, the thesis suggests that by focusing stronger on use of customer information, service development processes can be restructured in order to facilitate the information that is actually used.