807 resultados para privacy violations
Resumo:
En este documento se lleva a cabo el mismo experimento realizado por Harbaugh et al. (2001) usando como sujetos en el experimento a estudiantes de economía, ciencias políticas y medicina, quienes tienen una fuerte, mediana y nula formación en economía. El objetivo es encontrar violaciones al axioma débil de preferencia revelada (ADPR) y medir la magnitud de las violaciones mediante el calculo del índice de Afriat. Después de la evaluación de los resultados del experimento encontramos que un entrenamiento exhaustivo y medio en economía genera básicamente los mismos resultados en términos de la violación al ADPR, y que ningún entrenamiento en economía implica un considerable numero de decisiones erróneas en términos económicos.
Resumo:
El texto analiza el impacto de la corrupción policial presentada por los medios de comunicación desde 1993 hasta el 2012 en la estructura interna de la Policía Nacional de Colombia. En el primer capítulo se plantea un estado del arte del concepto de corrupción policial, asimismo, se incluyen las teorías bajo las cuales se ha entendido el fenómeno a nivel mundial buscando generar soluciones plausibles a un flagelo en el que se ven inmiscuidos una gran cantidad de cuerpos policiales en el mundo. En el segundo apartado, se evalúa de manera cuantitativa cómo los casos de corrupción han modificado la estructura de la Policía Nacional, pero a su vez, cómo éstas modificaciones han sido evanescentes. En el tercer capítulo, se escudriña el impacto y los cambios estructurales desde la perspectiva de los miembros del cuerpo policial, recurriendo a la recolección de datos de manera cualitativa por medio de entrevistas y encuestas. En el cuarto momento se analiza la incidencia de los directores de la policía en la lucha contra la corrupción policial y como se establece una relación entre los subalternos y los mandos medios al momento de realizar este tipo de actividades. Finalmente se plasman las conclusiones a las que se llegó posterior a la realización del trabajo investigativo.
Resumo:
Se analiza el efecto de la magnitud de la probabilidad de la pérdida en el riesgo asumido por 60 conductores, de edades comprendidas entre los 19 y los 44 años (Media = 23.38; SD = 4.78), en un programa de simulación de conducción. Tanto las teorías basa as en la utilidad esperada, como los modelos basados en la Teoría del Aprendizaje, predicen una relación inversa entre dichas variables y el riesgo asumido. Los resultados de nuestro estudio corroboran tales predicciones en cuanto a la probabilidad de la pérdida: el riesgo asumido disminuye a medida que aumenta la probabilidad de la pérdida. El riesgo asumido, en cambio, parece ser independiente de la magnitud de la probabilidad de la pérdida. De acuerdo con estos resultados, resultaría más efectivo aumentar el control para garantizar el cumplimiento de las normas de circulación que incrementar la cuantía de las sanciones por su incumplimiento
Resumo:
La tesi és una investigació histórica que presenta el fet musical a la ciutat de Girona, i inclou una paronòmica general de la història musical de les principals poblacions de les seves comarques: Olot, Figueres, Banyoles. ripoll, La Bisbal d'Empordà, Sant Feliu de Guíxols, etc. Està organitzada metodològicament en un marc cronològic i una metodologia positivista, intentant reflexar la verdadera història de la música a la ciutat de Girona amb tots i cadascun dels seus personatges i les seves institucions. La recerca s'emmarca al voltant de les corrents artístiques i polítiques de cada moment: Modernisme, Noucentisme, República, Guerra Civil, Franquisme i Democràcia. De cadascuna d'ella s'ha investigat sobre les orquestres, les cobles i les sardanes, els grups de música de cambra, la música en els cafès, la música en la intimitat de les cases particulars, el desenvolupament laboral de la professió musical a travès de la història del Sindicat i la Mútua de Músics, les sales de ball, els cinemes amb música en directe, els crítics musicals, etc. La recerca porta a la conclusió final de què l'època de millor esplendor, de més qualitat i també quantitat de música a la ciutat i comarques, i que ha viscut un millor ambient musical en tota la història, és el període que va des de principis del segle XX fins a l'esclat de la Guerra Civil (1900-1936)
Resumo:
La comunitat científica que treballa en Intel·ligència Artificial (IA) ha dut a terme una gran quantitat de treball en com la IA pot ajudar a les persones a trobar el que volen dins d'Internet. La idea dels sistemes recomanadors ha estat extensament acceptada pels usuaris. La tasca principal d'un sistema recomanador és localitzar ítems, fonts d'informació i persones relacionades amb els interessos i preferències d'una persona o d'un grup de persones. Això comporta la construcció de models d'usuari i l'habilitat d'anticipar i predir les preferències de l'usuari. Aquesta tesi està focalitzada en l'estudi de tècniques d'IA que millorin el rendiment dels sistemes recomanadors. Inicialment, s'ha dut a terme un anàlisis detallat de l'actual estat de l'art en aquest camp. Aquest treball ha estat organitzat en forma de taxonomia on els sistemes recomanadors existents a Internet es classifiquen en 8 dimensions generals. Aquesta taxonomia ens aporta una base de coneixement indispensable pel disseny de la nostra proposta. El raonament basat en casos (CBR) és un paradigma per aprendre i raonar a partir de la experiència adequat per sistemes recomanadors degut als seus fonaments en el raonament humà. Aquesta tesi planteja una nova proposta de CBR aplicat al camp de la recomanació i un mecanisme d'oblit per perfils basats en casos que controla la rellevància i edat de les experiències passades. Els resultats experimentals demostren que aquesta proposta adapta millor els perfils als usuaris i soluciona el problema de la utilitat que pateixen el sistemes basats en CBR. Els sistemes recomanadors milloren espectacularment la qualitat dels resultats quan informació sobre els altres usuaris és utilitzada quan es recomana a un usuari concret. Aquesta tesi proposa l'agentificació dels sistemes recomanadors per tal de treure profit de propietats interessants dels agents com ara la proactivitat, la encapsulació o l'habilitat social. La col·laboració entre agents es realitza a partir del mètode de filtratge basat en la opinió i del mètode col·laboratiu de filtratge a partir de confiança. Els dos mètodes es basen en un model social de confiança que fa que els agents siguin menys vulnerables als altres quan col·laboren. Els resultats experimentals demostren que els agents recomanadors col·laboratius proposats milloren el rendiment del sistema mentre que preserven la privacitat de les dades personals de l'usuari. Finalment, aquesta tesi també proposa un procediment per avaluar sistemes recomanadors que permet la discussió científica dels resultats. Aquesta proposta simula el comportament dels usuaris al llarg del temps basat en perfils d'usuari reals. Esperem que aquesta metodologia d'avaluació contribueixi al progrés d'aquesta àrea de recerca.
Resumo:
Esta es una compilación y transcripción de sentencias de la Corte Interamericana de Derechos Humanos, en las que se puede apreciar los argumentos de la Comisión Interamericana de Derechos Humanos y las consideraciones de la Corte para resolver violaciones al derecho a la libertad de expresión.
Resumo:
El presente artículo aborda el impacto de la transformación tecnológica y los nuevos instrumentos de la teleinformática en los medios de comunicación masiva. La forma como se han estructurado las transnacionales mediáticas a partir del uso de instrumentos como la web, el software o el podcasting y los riesgos que su exceso conlleva respecto de la democracia al imponer sus intereses económicos y culturales por encima del interés del individuo, el interés público, la intimidad y el honor. Todo lo cual plantea nuevos desafíos al derecho y la protección de los derechos del individuo.
Resumo:
El tema de los Derechos humanos se ubica en el corazón de la teoría moderna del derecho internacional. Desde el final de la Segunda Guerra Mundial, esta rama de la ciencia jurídica ha conocido múltiples desarrollos, buscando primordialmente la protección de esos derechos, conceptualizados en generaciones. Este proceso se ha caracterizado por la creación de mecanismos –de alcance regional y universal– cuyo papel es reparar el daño causado a las víctimas de violaciones de los derechos humanos, y, en ciertos casos, castigar a sus verdugos. El presente artículo analiza estas varias facetas de una disciplina en constante evolución, a través de ejemplos concretos que permitirán efectuar una ponderación de la eficacia del sistema internacional de salvaguardia de los Derechos humanos.
Resumo:
This Policy Contribution assesses the broad obstacles hampering ICT-led growth in Europe and identifies the main areas in which policy could unlock the greatest value. We review estimates of the value that could be generated through take-up of various technologies and carry out a broad matching with policy areas. According to the literature survey and the collected estimates, the areas in which the right policies could unlock the greatest ICT-led growth are product and labour market regulations and the European Single Market. These areas should be reformed to make European markets more flexible and competitive. This would promote wider adoption of modern data-driven organisational and management practices thereby helping to close the productivity gap between the United States and the European Union. Gains could also be made in the areas of privacy, data security, intellectual property and liability pertaining to the digital economy, especially cloud computing, and next generation network infrastructure investment. Standardisation and spectrum allocation issues are found to be important, though to a lesser degree. Strong complementarities between the analysed technologies suggest, however, that policymakers need to deal with all of the identified obstacles in order to fully realise the potential of ICT to spur long-term growth beyond the partial gains that we report.
Resumo:
This paper reflects on the challenges facing the effective implementation of the new EU fundamental rights architecture that emerged from the Lisbon Treaty. Particular attention is paid to the role of the Court of Justice of the European Union (CJEU) and its ability to function as a ‘fundamental rights tribunal’. The paper first analyses the praxis of the European Court of Human Rights in Strasbourg and its long-standing experience in overseeing the practical implementation of the European Convention for the Protection of Human Rights and Fundamental Freedoms. Against this analysis, it then examines the readiness of the CJEU to live up to its consolidated and strengthened mandate on fundamental rights as one of the prime guarantors of the effective implementation of the EU Charter of Fundamental Rights. We specifically review the role of ‘third-party interventions’ by non-governmental organisations, international and regional human rights actors as well as ‘interim relief measures’ when ensuring effective judicial protection of vulnerable individuals in cases of alleged violations of fundamental human rights. To flesh out our arguments, we rely on examples within the scope of the relatively new and complex domain of EU legislation, the Area of Freedom, Security and Justice (AFSJ), and its immigration, external border and asylum policies. In view of the fundamental rights-sensitive nature of these domains, which often encounter shifts of accountability and responsibility in their practical application, and the Lisbon Treaty’s expansion of the jurisdiction of the CJEU to interpret and review EU AFSJ legislation, this area can be seen as an excellent test case for the analyses at hand. The final section puts forth a set of policy suggestions that can assist the CJEU in the process of adjusting itself to the new fundamental rights context in a post-Lisbon Treaty setting.
Resumo:
The Data Protection Regulation proposed by the European Commission contains important elements to facilitate and secure personal data flows within the Single Market. A harmonised level of protection of individual data is an important objective and all stakeholders have generally welcomed this basic principle. However, when putting the regulation proposal in the complex context in which it is to be implemented, some important issues are revealed. The proposal dictates how data is to be used, regardless of the operational context. It is generally thought to have been influenced by concerns over social networking. This approach implies protection of data rather than protection of privacy and can hardly lead to more flexible instruments for global data flows.
Resumo:
This study examines current and forthcoming measures related to the exchange of data and information in EU Justice and Home Affairs policies, with a focus on the ‘smart borders’ initiative. It argues that there is no reversibility in the growing reliance on such schemes and asks whether current and forthcoming proposals are necessary and original. It outlines the main challenges raised by the proposals, including issues related to the right to data protection, but also to privacy and non-discrimination.
Resumo:
Would a research assistant - who can search for ideas related to those you are working on, network with others (but only share the things you have chosen to share), doesn’t need coffee and who might even, one day, appear to be conscious - help you get your work done? Would it help your students learn? There is a body of work showing that digital learning assistants can be a benefit to learners. It has been suggested that adaptive, caring, agents are more beneficial. Would a conscious agent be more caring, more adaptive, and better able to deal with changes in its learning partner’s life? Allow the system to try to dynamically model the user, so that it can make predictions about what is needed next, and how effective a particular intervention will be. Now, given that the system is essentially doing the same things as the user, why don’t we design the system so that it can try to model itself in the same way? This should mimic a primitive self-awareness. People develop their personalities, their identities, through interacting with others. It takes years for a human to develop a full sense of self. Nobody should expect a prototypical conscious computer system to be able to develop any faster than that. How can we provide a computer system with enough social contact to enable it to learn about itself and others? We can make it part of a network. Not just chatting with other computers about computer ‘stuff’, but involved in real human activity. Exposed to ‘raw meaning’ – the developing folksonomies coming out of the learning activities of humans, whether they are traditional students or lifelong learners (a term which should encompass everyone). Humans have complex psyches, comprised of multiple strands of identity which reflect as different roles in the communities of which they are part – so why not design our system the same way? With multiple internal modes of operation, each capable of being reflected onto the outside world in the form of roles – as a mentor, a research assistant, maybe even as a friend. But in order to be able to work with a human for long enough to be able to have a chance of developing the sort of rich behaviours we associate with people, the system needs to be able to function in a practical and helpful role. Unfortunately, it is unlikely to get a free ride from many people (other than its developer!) – so it needs to be able to perform a useful role, and do so securely, respecting the privacy of its partner. Can we create a system which learns to be more human whilst helping people learn?
Resumo:
Different systems, different purposes – but how do they compare as learning environments? We undertook a survey of students at the University, asking whether they learned from their use of the systems, whether they made contact with other students through them, and how often they used them. Although it was a small scale survey, the results are quite enlightening and quite surprising. Blackboard is populated with learning material, has all the students on a module signed up to it, a safe environment (in terms of Acceptable Use and some degree of staff monitoring) and provides privacy within the learning group (plus lecturer and relevant support staff). Facebook, on the other hand, has no learning material, only some of the students using the system, and on the face of it, it has the opportunity for slips in privacy and potential bullying because the Acceptable Use policy is more lax than an institutional one, and breaches must be dealt with on an exception basis, when reported. So why do more students find people on their courses through Facebook than Blackboard? And why are up to 50% of students reporting that they have learned from using Facebook? Interviews indicate that students in subjects which use seminars are using Facebook to facilitate working groups – they can set up private groups which give them privacy to discuss ideas in an environment which perceived as safer than Blackboard can provide. No staff interference, unless they choose to invite them in, and the opportunity to select who in the class can engage. The other striking finding is the difference in use between the genders. Males are using blackboard more frequently than females, whilst the reverse is true for Facebook. Interviews suggest that this may have something to do with needing to access lecture notes… Overall, though, it appears that there is little relationship between the time spent engaging with Blackboard and reports that students have learned from it. Because Blackboard is our central repository for notes, any contact is likely to result in some learning. Facebook, however, shows a clear relationship between frequency of use and perception of learning – and our students post frequently to Facebook. Whilst much of this is probably trivia and social chit chat, the educational elements of it are, de facto, contructivist in nature. Further questions need to be answered - Is the reason the students learn from Facebook because they are creating content which others will see and comment on? Is it because they can engage in a dialogue, without the risk of interruption by others?
Resumo:
Since the advent of the internet in every day life in the 1990s, the barriers to producing, distributing and consuming multimedia data such as videos, music, ebooks, etc. have steadily been lowered for most computer users so that almost everyone with internet access can join the online communities who both produce, consume and of course also share media artefacts. Along with this trend, the violation of personal data privacy and copyright has increased with illegal file sharing being rampant across many online communities particularly for certain music genres and amongst the younger age groups. This has had a devastating effect on the traditional media distribution market; in most cases leaving the distribution companies and the content owner with huge financial losses. To prove that a copyright violation has occurred one can deploy fingerprinting mechanisms to uniquely identify the property. However this is currently based on only uni-modal approaches. In this paper we describe some of the design challenges and architectural approaches to multi-modal fingerprinting currently being examined for evaluation studies within a PhD research programme on optimisation of multi-modal fingerprinting architectures. Accordingly we outline the available modalities that are being integrated through this research programme which aims to establish the optimal architecture for multi-modal media security protection over the internet as the online distribution environment for both legal and illegal distribution of media products.