809 resultados para privacy and security policies


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article will analyze the interplay between capital movements and trade
in services as structured in World Trade Organization (WTO) law, and it will
assess the implications of the capital account liberalization for the freedom of
WTO Members to pursue their economic policies. Although the movement
of capital is largely confined to the domain of international financial or monetary
policy, it is regulated by WTO law due to its role in the process of
financial services liberalization, which generally requires liberalized capital
flows. From a legal perspective, the interplay between capital movements
and trade in services requires striking a delicate balance between the right
of market access and the parallel right of economic stability. Indeed, a liberalized
regime for capital movements could pose serious stability problems
during times of crisis. For this reason, it is necessary that Members are able
to derogate from their obligations and adopt emergency measures.
Regulating the movement of capital in the General Agreement on Trade in
Services (GATS) requires stretching the regulatory oversight of WTO law
over different aspects of international economic policy. Indeed, capital movements are a fundamental component of the balance of payments and have a
major role in shaping monetary, fiscal, and financial policies. This article will
analyze how the discipline provided by the GATS on capital movements will
affect not only trade in services, but also the Members’ policy space on
monetary and fiscal policy. The article will conclude that while the GATS offers enough policy space for the maintenance of financial stability, it does
not fully take into consideration the need of Members to control capital
movements in order to conduct monetary policies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Analysing public sentiment about future events, such as demonstration or parades, may provide valuable information while estimating the level of disruption and disorder during these events. Social media, such as Twitter or Facebook, provides views and opinions of users related to any public topics. Consequently, sentiment analysis of social media content may be of interest to different public sector organisations, especially in the security and law enforcement sector. In this paper we present a lexicon-based approach to sentiment analysis of Twitter content. The algorithm performs normalisation of the sentiment in an effort to provide intensity of the sentiment rather than positive/negative label. Following this, we evaluate an evidence-based combining function that supports the classification process in cases when positive and negative words co-occur in a tweet. Finally, we illustrate a case study examining the relation between sentiment of twitter posts related to English Defence League and the level of disorder during the EDL related events.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cloud data centres are implemented as large-scale clusters with demanding requirements for service performance, availability and cost of operation. As a result of scale and complexity, data centres typically exhibit large numbers of system anomalies resulting from operator error, resource over/under provisioning, hardware or software failures and security issus anomalies are inherently difficult to identify and resolve promptly via human inspection. Therefore, it is vital in a cloud system to have automatic system monitoring that detects potential anomalies and identifies their source. In this paper we present a lightweight anomaly detection tool for Cloud data centres which combines extended log analysis and rigorous correlation of system metrics, implemented by an efficient correlation algorithm which does not require training or complex infrastructure set up. The LADT algorithm is based on the premise that there is a strong correlation between node level and VM level metrics in a cloud system. This correlation will drop significantly in the event of any performance anomaly at the node-level and a continuous drop in the correlation can indicate the presence of a true anomaly in the node. The log analysis of LADT assists in determining whether the correlation drop could be caused by naturally occurring cloud management activity such as VM migration, creation, suspension, termination or resizing. In this way, any potential anomaly alerts are reasoned about to prevent false positives that could be caused by the cloud operator’s activity. We demonstrate LADT with log analysis in a Cloud environment to show how the log analysis is combined with the correlation of systems metrics to achieve accurate anomaly detection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Grand Chamber of the European Court of Human Rights recently delivered an important judgment on Article 3 ECHR in the case of Bouyid v Belgium. In Bouyid, the Grand Chamber was called upon to consider whether slaps inflicted on a minor and an adult in police custody were in breach of Article 3 ECHR, which provides that ‘No one shall be subjected to torture or to inhuman or degrading treatment or punishment’. Overruling the Chamber judgment in the case, the Grand Chamber ruled by 14 votes to 3 that there had been a substantive violation of Article 3 in that the applicants had been subjected to degrading treatment by members of the Belgian police; it found that there had been a breach of the investigative duty under Article 3 also. In this comment, I focus on the fundamental basis of disagreement between the majority of the Grand Chamber and those who found themselves in dissent, on the question of whether there had been a substantive breach of Article 3. The crux of the disagreement lay in the understanding and application of the test of ‘minimum level of severity’, which the ECtHR has established as decisive of whether a particular form of ill-treatment crosses the Article 3 threshold, seen also in light of Article 3’s absolute character, which makes it non-displaceable – that is, immune to trade-offs of the type applicable in relation to qualified rights such as privacy and freedom of expression. I consider the way the majority of the Grand Chamber unpacked and applied the concept of dignity – or ‘human dignity’ – towards finding a substantive breach of Article 3, and briefly distil some of the principles underpinning the understanding of human dignity emerging in the Court’s analysis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the rapid development of internet-of-things (IoT), face scrambling has been proposed for privacy protection during IoT-targeted image/video distribution. Consequently in these IoT applications, biometric verification needs to be carried out in the scrambled domain, presenting significant challenges in face recognition. Since face models become chaotic signals after scrambling/encryption, a typical solution is to utilize traditional data-driven face recognition algorithms. While chaotic pattern recognition is still a challenging task, in this paper we propose a new ensemble approach – Many-Kernel Random Discriminant Analysis (MK-RDA) to discover discriminative patterns from chaotic signals. We also incorporate a salience-aware strategy into the proposed ensemble method to handle chaotic facial patterns in the scrambled domain, where random selections of features are made on semantic components via salience modelling. In our experiments, the proposed MK-RDA was tested rigorously on three human face datasets: the ORL face dataset, the PIE face dataset and the PUBFIG wild face dataset. The experimental results successfully demonstrate that the proposed scheme can effectively handle chaotic signals and significantly improve the recognition accuracy, making our method a promising candidate for secure biometric verification in emerging IoT applications.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Internet Tra c, Internet Applications, Internet Attacks, Tra c Pro ling, Multi-Scale Analysis abstract Nowadays, the Internet can be seen as an ever-changing platform where new and di erent types of services and applications are constantly emerging. In fact, many of the existing dominant applications, such as social networks, have appeared recently, being rapidly adopted by the user community. All these new applications required the implementation of novel communication protocols that present di erent network requirements, according to the service they deploy. All this diversity and novelty has lead to an increasing need of accurately pro ling Internet users, by mapping their tra c to the originating application, in order to improve many network management tasks such as resources optimization, network performance, service personalization and security. However, accurately mapping tra c to its originating application is a di cult task due to the inherent complexity of existing network protocols and to several restrictions that prevent the analysis of the contents of the generated tra c. In fact, many technologies, such as tra c encryption, are widely deployed to assure and protect the con dentiality and integrity of communications over the Internet. On the other hand, many legal constraints also forbid the analysis of the clients' tra c in order to protect their con dentiality and privacy. Consequently, novel tra c discrimination methodologies are necessary for an accurate tra c classi cation and user pro ling. This thesis proposes several identi cation methodologies for an accurate Internet tra c pro ling while coping with the di erent mentioned restrictions and with the existing encryption techniques. By analyzing the several frequency components present in the captured tra c and inferring the presence of the di erent network and user related events, the proposed approaches are able to create a pro le for each one of the analyzed Internet applications. The use of several probabilistic models will allow the accurate association of the analyzed tra c to the corresponding application. Several enhancements will also be proposed in order to allow the identi cation of hidden illicit patterns and the real-time classi cation of captured tra c. In addition, a new network management paradigm for wired and wireless networks will be proposed. The analysis of the layer 2 tra c metrics and the di erent frequency components that are present in the captured tra c allows an e cient user pro ling in terms of the used web-application. Finally, some usage scenarios for these methodologies will be presented and discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Perante uma sociedade em célere envelhecimento demográfico e permanente avanço tecnológico, justifica-se a aposta em estudos que potenciem a ação comunicativa e a diminuição do isolamento social decorrente das perdas biopsicossociais associadas à idade sénior. Esta tese possui quatro objetivos de estudo: i) pretende-se investigar qual é o impacto da utilização das Tecnologias de Informação e Comunicação (TIC) no autoconceito (AC), no ânimo e na qualidade de vida (QV) de um grupo de seniores; ii) perceber se existe e qual a relação entre as variáveis independentes sexo, idade, estado civil, escolaridade, profissão, IPSS, regime de frequência, tempo na IPSS, orientação para frequentar a IPSS, visita de familiares e visita de amigos e as variáveis dependentes AC, ânimo, QV e respetivos fatores e domínios, nos momentos de pré e pós-teste; iii) perceber se a sua participação no processo de conceptualização de um serviço de comunicação assíncrona, email, influencia a sua usabilidade ao nível das componentes eficácia, eficiência e satisfação; iv) e sugerir a componente política da comunidade online sénior em desenvolvimento no âmbito do Projeto SEDUCE. Para o desenvolvimento do estudo estabeleceram-se parcerias com quatro Instituições Particulares de Segurança Social do concelho de Aveiro, integradas no âmbito do projeto SEDUCE. Os instrumentos utilizados para a avaliação do autoconceito, do ânimo e da qualidade de vida foram o Inventário Clínico de Auto-Conceito, a Escala de Ânimo do Centro Geriátrico de Philadelphia e a Escala de Qualidade de Vida da Organização Mundial de Saúde WHOQOL-Bref, respetivamente. No processo de conceptualização do serviço de email e da componente política da comunidade online utilizou-se a observação participativa e o contextual design. O estudo envolveu a participação de 42 seniores distribuídos por duas condições experimentais: 22 seniores do grupo experimental utilizaram as TIC duas vezes por semana (em sessões de 90 minutos cada, num total de 80 sessões) e 19 seniores do grupo de controlo passivo não experimentaram qualquer intervenção. Para a avaliação das variáveis psicossociais realizaram-se dois momentos de avaliação, antes e depois de 11 meses de intervenção, de Agosto de 2011 a Julho de 2012. Ao longo das sessões de envolvimento com as TIC observou-se que os seniores apresentam, continuamente, dificuldades em: manipular o rato e percecionar a sua ação no monitor; fazer a distinção entre teclas (enter, spacebar, delete, caps lock entre outras); em utilizar duplas teclas para colocar pontuação e acentuação; iniciar atividades no Microsoft Office Word; selecionar a informação disponibilizada em motores de pesquisa; perceber quais as zonas clicáveis; falta de confiança em efetivar ações; receio em iniciar nova atividades, pela falta de conhecimento e pelo medo de errar; memorizar endereços de email e passwords; e dar continuidade às tarefas. Na utilização do serviço de email consideram importante receber resposta quando enviam uma mensagem, assim como responder sempre aos remetentes; raramente colocam assunto nas mensagens; e expressam grande satisfação ao receber mensagens de familiares e/ou amigos. O processo de desenvolvimento de serviços com a participação ativa dos seniores revela-se exequível mas é necessário adaptar as práticas: os processos devem ser iterativos; evitar linguagem formal; clarificar o objetivo; deixar os seniores pensar em voz alta; dar-lhes tempo; mantê-los focados e não conduzi-los nas tarefas. Os resultados sugerem que houve aumento significativo do domínio físico da qualidade de vida do grupo experimental. Os participantes que exprimiram maiores níveis de satisfação ao utilizar as TIC apresentam uma perspetiva mais positiva sobre a maturidade psicológica e menos solidão e insatisfação. No grupo experimental e no grupo de controlo passivo verificam-se relações entre as variáveis independentes e as variáveis dependentes, quer no momento de pré-teste como de pós-teste. Conclui-se que a participação dos seniores no processo de conceptualização do serviço de email permitiu fomentar a componente eficácia da usabilidade mas não a satisfação ao utilizar o mesmo. Os resultados sobre a eficiência são inconclusivos. Sobre a componente política os seniores validam a existência de termos de utilização que orientem o comportamento de todos os utilizadores, assim como de uma política de privacidade. A área de registo proposta é adequada ao utilizador sénior.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We consider some problems of the calculus of variations on time scales. On the beginning our attention is paid on two inverse extremal problems on arbitrary time scales. Firstly, using the Euler-Lagrange equation and the strengthened Legendre condition, we derive a general form for a variation functional that attains a local minimum at a given point of the vector space. Furthermore, we prove a necessary condition for a dynamic integro-differential equation to be an Euler-Lagrange equation. New and interesting results for the discrete and quantum calculus are obtained as particular cases. Afterwards, we prove Euler-Lagrange type equations and transversality conditions for generalized infinite horizon problems. Next we investigate the composition of a certain scalar function with delta and nabla integrals of a vector valued field. Euler-Lagrange equations in integral form, transversality conditions, and necessary optimality conditions for isoperimetric problems, on an arbitrary time scale, are proved. In the end, two main issues of application of time scales in economic, with interesting results, are presented. In the former case we consider a firm that wants to program its production and investment policies to reach a given production rate and to maximize its future market competitiveness. The model which describes firm activities is studied in two different ways: using classical discretizations; and applying discrete versions of our result on time scales. In the end we compare the cost functional values obtained from those two approaches. The latter problem is more complex and relates to rate of inflation, p, and rate of unemployment, u, which inflict a social loss. Using known relations between p, u, and the expected rate of inflation π, we rewrite the social loss function as a function of π. We present this model in the time scale framework and find an optimal path π that minimizes the total social loss over a given time interval.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The suppression of drug consumption and trade is high on the Government of Vietnam’s agenda. To accomplish this goal, Vietnam employs repressive policies that often contravene international human rights law. Among the most detrimental and problematic policies are the incarceration of drug users in compulsory treatment centers, and the stigmatization and abuse of consumers by the police. That said, Vietnamese drug policy is slowly changing in the face of one of Asia’s worst ongoing HIV epidemics. While the Communist Government of the early-1990s designated illicit drugs as a “social evil” to be eradicated through punitive and often repressive means, the recent implementation of harm reduction approaches have reduced the level of needle sharing, and thus HIV transmission. This briefing will explore the current trends in drug consumption, production, and trafficking before looking at the key harms and threats associated with drugs in Vietnam. This will be followed by a summary of Vietnam’s drug policies, including the country’s approach to drug treatment, harm reduction, and illicit opium suppression—Vietnam is one of a small number of states to have suppressed illicit opium production, an intervention that centred upon coercive negotiations with limited alternative development. The briefing will conclude with some tentative recommendations for reform and thoughts on what could be expected from Vietnam during the Special Session of the United Nations General Assembly on the World Drug Problem (UNGASS 2016).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tese de doutoramento, Educação (Supervisão e Orientação da Prática Profissional), Universidade de Lisboa, Instituto de Educação, 2015

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Thesis (Master's)--University of Washington, 2014

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter compares recent policy on the use of English and Norwegian in Higher Education with earlier policies on the relationship between the two standard varieties of Norwegian, and it charts how and why English became a policy issue in Norway. Based on the experience of over a century of language planning, a highly interventionist approach is today being avoided and language policies in the universities of Norway seek to nurture a situation where English and Norwegian may be used productively side-by-side. However, there remain serious practical challenges to be overcome. This paper also builds on a previous analysis (Linn 2010b) of the metalanguage of Nordic language policy and seeks to clarify the use of the term ‘parallelingualism’.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Portugal hosted in the last thirteen years, two editions of the event European Cultural Capital; this paper intends to illustrate the coverage that Portuguese newspapers (daily newspapers Público, Diário de Notícias, Correio da Manhã and Jornal de Notícias, a weekly newsmagazine Visão and a weekly newspaper Expresso) made, through referrals in front-page and respective developments within the editions, to each of the events and that allows us to define the main moments that marked each of them, patterns of action, the major players, planning and programming types. The European Cultural Capital project elects, from year to year, cities of different EU member states with the main goal of “contributing to bring together the Europe´s people" (words of Mélina Mercouri, Greek Minister of Culture who, in 1985, proposed the launch of this initiative) and encouraging the elected urban space to present new cultural paradigms. In the genesis of this model is the cultural decentralization’s vector, a possibility to medium-sized cities of funding public works, restoring heritage and promoting themselves in touristic terms, of giving visibility to cities away from cultural and creative industries’ major distribution centers. A crucial factor to achieve this goal is media coverage. This paper outline the information that the Portuguese press ran over the two years that elapsed the latest editions of the European Cultural Capital in Portugal, namely that media coverage have deviated from the disclosure of the events’ schedule to suggest itineraries of visit and little or not even question the role that cities, promoting such initiatives, have as places of innovation in terms of cultural policies, artistic production and innovation, in urban and environmental regeneration, in economic revitalization, in training and creating new artists and new audiences and in boosting the confidence of local communities. The content analysis performed to articles shows how press is essential to the promotion of cities as cultural/touristic destinations as it stimulates consumption among residents and attracts visitors, with the possible dire consequence of turning the cultural journalist into an agent of touristic instead of cultural promotion.