884 resultados para Libyan Data Protection Authority


Relevância:

100.00% 100.00%

Publicador:

Resumo:

While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Parents whose children are identified as having experienced or being at risk of experiencing significant harm potentially provide an invaluable dimension to our understanding of the circumstances that result in child abuse or neglect and how best to respond to these invariably complex situations. This paper reports findings from a study of the experiences of six parents. In-depth interviews were conducted with four mothers and two fathers who had been referred to an intensive family support services by the Queensland statutory child protection authority. Using a critical ecological perspective, the study focused on identifying and understanding the experiences of the parents in using formal family support services, including aspects of service delivery that were helpful or unhelpful. Parents also commented on their experiences of statutory child protection services. Service components and worker qualities that parents identified as being helpful included being accessible, targeted and integrated and being able to meet a continuum of needs, from a micro to a broader level. Their reports provide invaluable insight into how formal family support services, including child protection services, can better meet the needs of parents in addressing the recurring problem of child maltreatment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Trans-Pacific Partnership is a sweeping trade agreement, spanning the Pacific Rim, and covering an array of topics, including intellectual property. There has been much analysis of the recently leaked intellectual property chapter of the Trans-Pacific Partnership by WikiLeaks. Julian Assange, WikiLeaks’ Editor-in-Chief, observed “The selective secrecy surrounding the TPP negotiations, which has let in a few cashed-up megacorps but excluded everyone else, reveals a telling fear of public scrutiny. By publishing this text we allow the public to engage in issues that will have such a fundamental impact on their lives.” Critical attention has focused upon the lack of transparency surrounding the agreement, copyright law and the digital economy; patent law, pharmaceutical drugs, and data protection; and the criminal procedures and penalties for trade secrets. The topic of trade mark law and related rights, such as internet domain names and geographical indications, deserves greater analysis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Process view technology is catching more attentions in modern business process management, as it enables the customisation of business process representation. This capability helps improve the privacy protection, authority control, flexible display, etc., in business process modelling. One of approaches to generate process views is to allow users to construct an aggregate on their underlying processes. However, most aggregation approaches stick to a strong assumption that business processes are always well-structured, which is over strict to BPMN. Aiming to build process views for non-well-structured BPMN processes, this paper investigates the characteristics of BPMN structures, tasks, events, gateways, etc., and proposes a formal process view aggregation approach to facilitate BPMN process view creation. A set of consistency rules and construction rules are defined to regulate the aggregation and guarantee the order preservation, structural and behaviour correctness and a novel aggregation technique, called EP-Fragment, is developed to tackle non-well-structured BPMN processes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ubiquitous computing is about making computers and computerized artefacts a pervasive part of our everyday lifes, bringing more and more activities into the realm of information. The computationalization, informationalization of everyday activities increases not only our reach, efficiency and capabilities but also the amount and kinds of data gathered about us and our activities. In this thesis, I explore how information systems can be constructed so that they handle this personal data in a reasonable manner. The thesis provides two kinds of results: on one hand, tools and methods for both the construction as well as the evaluation of ubiquitous and mobile systems---on the other hand an evaluation of the privacy aspects of a ubiquitous social awareness system. The work emphasises real-world experiments as the most important way to study privacy. Additionally, the state of current information systems as regards data protection is studied. The tools and methods in this thesis consist of three distinct contributions. An algorithm for locationing in cellular networks is proposed that does not require the location information to be revealed beyond the user's terminal. A prototyping platform for the creation of context-aware ubiquitous applications called ContextPhone is described and released as open source. Finally, a set of methodological findings for the use of smartphones in social scientific field research is reported. A central contribution of this thesis are the pragmatic tools that allow other researchers to carry out experiments. The evaluation of the ubiquitous social awareness application ContextContacts covers both the usage of the system in general as well as an analysis of privacy implications. The usage of the system is analyzed in the light of how users make inferences of others based on real-time contextual cues mediated by the system, based on several long-term field studies. The analysis of privacy implications draws together the social psychological theory of self-presentation and research in privacy for ubiquitous computing, deriving a set of design guidelines for such systems. The main findings from these studies can be summarized as follows: The fact that ubiquitous computing systems gather more data about users can be used to not only study the use of such systems in an effort to create better systems but in general to study phenomena previously unstudied, such as the dynamic change of social networks. Systems that let people create new ways of presenting themselves to others can be fun for the users---but the self-presentation requires several thoughtful design decisions that allow the manipulation of the image mediated by the system. Finally, the growing amount of computational resources available to the users can be used to allow them to use the data themselves, rather than just being passive subjects of data gathering.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

[ES] Se estudian las características comunes y específicas de los gestores personales de bases de datos de referencias bibliográficas más utilizados: Reference Manager, EndNote, ProCite, RefWorks y EndNote Web. Los Apartados analizados son: la entrada de datos, el control de autoridades, los comandos de edición global, la personalización de algunos aspectos de las bases de datos, la exportación de las referencias, la visualización de los Registros, la inserción de citas bibliográficas y la generación automática de bibliografías.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The 10th annual Jisc, GuildHE and Universities UK information legislation and management survey shows a rise in the number of Freedom of Information (FOI) requests for the tenth consecutive year. In contrast Environmental Information Regulations (EIR) requests appear to have levelled off to a fairly consistent rate, while Data Protection Act (DPA) requests have declined back to levels last seen in 2008. The average monthly number of FOI requests received by UK universities has risen by 19% since 2013 and by almost seven times over the last decade since our survey began. The average across the 46 participating institutions was 219 FOI requests with the highest of 454 reported by one participant.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The 10th annual Jisc, GuildHE and Universities UK information legislation and management survey shows a rise in the number of Freedom of Information (FOI) requests for the tenth consecutive year. In contrast Environmental Information Regulations (EIR) requests appear to have levelled off to a fairly consistent rate, while Data Protection Act (DPA) requests have declined back to levels last seen in 2008. The average monthly number of FOI requests received by UK universities has risen by 19% since 2013 and by almost seven times over the last decade since our survey began. The average across the 47 participating institutions was 218 FOI requests with the highest of 454 reported by one participant.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This guidance is for staff in universities involved in developing Massive Open Online Courses (MOOCs), and considers the legal issues focusing particularly on the intellectual property rights (IPR) issues and data protection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O presente trabalho analisa a formação da cidade digital nas relações sociais, ressaltando os efeitos da garantia do direito à privacidade no ambiente dos navegantes de sites e redes sociais, em função das repercussões jurídicas do vazamento de informações da vida pessoal dos usuários da rede, e do tratamento dos dados coletados pelos prestadores de serviço. Através do ciberespaço formam-se comunidades virtuais que ultrapassam a necessidade de localidade e sociabilidade, criando um isolamento social e abandonando as interações face a face em ambientes reais, originando uma sociabilidade baseada no individualismo. Avaliamos os novos padrões de interação que se originam nesta nova formatação de coletividade informacional e suas repercussões no âmbito do direito. Em uma perspectiva mais detalhada, esse estudo indica quais as hipóteses de responsabilidade civil dos provedores na Internet em decorrência de atos ilícitos cometidos por terceiros e as alternativas de um sistema de tutela da privacidade à proteção de dados, face à lesão no ambiente informacional. O levantamento das possíveis situações de responsabilização civil foi efetuado através da análise da jurisprudência e da doutrina dominante, ressaltando os aspectos fáticos que caracterizam sua formatação. Esse modelo se impõe, através de uma relação hierárquica a uma multiplicidade de indivíduos, criando um encarceramento perfeito através do exercício do biopoder. Tais papéis são reforçados por uma cultura consumista e a sociedade do espetáculo, que transforma o indivíduo em mercadoria levantando perfis de usuários conectados em rede, propiciando uma categorização dos consumidores. Nesse contexto, apresentamos os riscos de uma sociedade de vigilância que se apresenta factível como um produto das relações de mercado, que possibilita dispor livremente de um conjunto crescente de informações. Esta constante vigilância invade todos os espaços, custodiando nosso comportamento independente do tempo, com uma implacável memória no âmbito das comunicações eletrônicas, tornando nosso passado eternamente visível e fazendo surgir situações constrangedoras a nos assombrar.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

[ES]Con el desarrollo de las nuevas tecnologías, se han facilitado las relaciones, acortado el tiempo de espera y agilizado los trámites con la Administración Pública. Estos adelantos, sin embargo, han propiciado que sea necesario proporcionar información de carácter personal de los ciudadanos, que en la mayoría de los casos es sensible. Es por esto que en los últimos años se han ido modificando e introduciendo nuevas leyes que permiten proteger estos datos de carácter personal. Cuando un contribuyente realiza sus obligaciones tributarias suministra datos de carácter personal a Hacienda, datos que están protegidos por la Ley Orgánica de Protección de Datos. El Sistema Tributario deber ser eficaz y transparente. Sin embargo, cabe preguntarse dónde se sitúa el límite a esa transparencia. Con el fin de que la transparencia sea máxima y de que la ciudadanía se conciencie de la importancia de cumplir con sus obligaciones tributarias el legislador se ha planteado la posibilidad de publicar una lista de deudores y las sentencias firmes condenatorias de grandes defraudadores. Esta publicación de las listas aparentemente vulneraría los derechos de los ciudadanos en lo referente a la protección de datos con opiniones encontradas. Tras informes de diferentes organismos se ha llegado al Proyecto de Ley de Modificación parcial de la Ley 58/2003, General Tributaria (Boletín Oficial de las Cortes Generales del 30 de abril de 2015), que permitiría publicar las listas con ciertos límites: publicación únicamente del nombre de la persona física o jurídica y DNI o NIF. Además, para permitir la publicación de las sentencias firmes de los defraudadores, recientemente se ha aprobado el Proyecto de reforma de la Ley Orgánica del Poder Judicial.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A discussão jurídica versa acerca da proteção ou não dos dados clínicos e informações não divulgadas Data Package, obtidos através de pesquisas clinicas, a partir do desenvolvimento de um novo medicamento. È importante realizar-se uma investigação prévia para descobrir se o novo medicamento a ser comercializado, possui efeitos benéficos ou adversos, que possam afetar os seres humanos, garantindo assim a eficácia e a segurança de sua utilização. O dossiê contendo os dados clínicos é submetido à Agência Nacional de Vigilância Sanitária que, no uso de sua atribuição específica, e em função da avaliação do cumprimento de caráter jurídico-administrativo e técnico-científico relacionado com a eficácia, segurança e qualidade do medicamento conforme a Lei 6360/76 e o Decreto 79.094/77 determina o registro sanitário. A tese defendida pelas sociedades farmacêuticas de pesquisa é a de que seria vedado à ANVISA deferir registros de medicamentos genéricos e similares de mesmo princípio ativo, com base nas pesquisas clinicas realizada, enquanto vigente o período de exclusividade, com fundamento no artigo 5, inciso XXIX da Constituição Federal, artigos 39.1, 39.2, 39.3 do Acordo sobre Aspectos dos Direitos de Propriedade Intelectual Acordo TRIPS, artigo 195, XIV da Lei n 9.279/96 (Lei da Propriedade Industrial), artigo 421, 884, 885 e 886 do CC, artigo 37, caput, da CF e artigo 2, da Lei 9.784/99 e aplicação analógica da Lei 10.603/2002. A ANVISA ao permitir aos fabricantes dos medicamentos genéricos e similares a utilização do pacote de dados clínicos, fornecido pelo titular do medicamento de referencia, estaria promovendo a concorrência desleal e parasitária, ao permitir que as versões genéricas e similares, ingressem no mercado, sob custos de produção e comerciais substancialmente menores, do que os praticadas pelos medicamentos de referencia. Este argumento tem fulcro na norma do artigo 39.3 do Acordo TRIPS firmado entre os membros da Organização Mundial do Comércio OMC, em 1994, no qual o Brasil é signatário, e que se comprometeram a adotar providências no sentido de manter em sigilo e protegidos contra o uso comercial desleal os dados clínicos relativos à pesquisa clínica, necessários à aprovação da comercialização de produtos farmacêuticos. A divulgação, exploração ou a utilização dos dados clínicos, sem a autorização do respectivo titular, o qual demandou recursos materiais e humanos consideráveis e desde que estas informações tenham sido apresentadas a entidades governamentais como condição para aprovação da comercialização de um medicamento, devem ser protegidas. Os Estados membros da OMC e subscritores do acordo internacional devem assegurar que os concorrentes não tenham acesso às informações recebidas pelo ente estatal, que não as explorarem ou delas possam aferir indevidamente tanto direta quanto indiretamente de vantagens que as beneficiem do conhecimento técnico-cientifico, investimentos e esforços realizados pelo titular daquela pesquisa clínica. Dentro deste cenário, faz-se necessário que o Estado produza um marco regulatório capaz de prover uma segurança jurídica, que permita as sociedades farmacêuticas disponibilizar elevado investimento, viabilizando a realização de pesquisa clinica e introdução de novos medicamentos.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The article considers the arguments that have been made in defence of social media screening as well as issues that arise and may effectively erode the reliability and utility of such data for employers. First, the authors consider existing legal frameworks and guidelines that exist in the UK and the USA, as well as the subsequent ethical concerns that arise when employers access and use social networking content for employment purposes. Second, several arguments in favour of the use of social networking content are made, each of which is considered from several angles, including concerns about impression management, bias and discrimination, data protection and security. Ultimately, the current state of knowledge does not provide a definite answer as to whether information from social networks is helpful in recruitment and selection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ramlogan, R.,& Tedd, L. (2006). Use and non-use of electronic information sources by undergraduates at the University of the West Indies. Online Information Review, 30(1), 24-42.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Routledge Guide to Interviewing sets out a well-tested and practical approach and methodology: what works, difficulties and dangers to avoid and key questions which must be answered before you set out. Background methodological issues and arguments are considered and drawn upon but the focus is on what is ethical, legally acceptable and productive:
-Rationale (why, what for, where, how)
-Ethics and Legalities (informed consent, data protection, risks, embargoes)
-Resources (organisational, technical, intellectual)
-Preparation (selecting and approaching interviewees, background and biographical research, establishing credentials, identifying topics)
-Technique (developing expertise and confidence)
-Audio-visual interviews
-Analysis (modes, methods, difficulties)
-Storage (archiving and long-term preservation)
-Sharing Resources (dissemination and development)

From death row to the mansion of a head of state, small kitchens and front parlours, to legislatures and presbyteries, Anna Bryson and Seán McConville’s wide interviewing experience has been condensed into this book. The material set out here has been acquired by trial, error and reflection over a period of more than four decades. The interviewees have ranged from the delightfully straightforward to the painfully difficult to the near impossible – with a sprinkling of those that were impossible.
Successful interviewing draws on the survival skills of everyday life. This guide will help you to adapt, develop and apply these innate skills. Including a range of useful information such as sample waivers, internet resources, useful hints and checklists, it provides sound and plain-speaking support for the oral historian, social scientist and investigator.