994 resultados para Computer Law


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Reference List for UK Computing Law

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Group Poster for UK Computing Law

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Zip file containing source code and database dump for the resource

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Collection of poster, reference list and resource source and database dump

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Las redes sociales digitales han transformado la forma de comunicarse en el Siglo XXI. Twitter es la red social más destacada para los periodistas colombianos pues según un estudio de la consultora de comunicación Burson-Marsteller, el 47% de los comunicadores colombianos utilizan esta red social para construir noticias (Burson-Marsteller, 2013). Por su popularidad, los medios de comunicación han puesto la mirada sobre esta red social pues ven en esta un nuevo espacio de información, razón por la cual se han transformado para convertir a Twitter en un nuevo conducto para la transmisión de sucesos coyunturales. En Colombia, los medios periodísticos de tradición intentan modificar su estructura y rutinas para adecuarse al nuevo molde comunicativo que propone la inclusión de las redes sociales digitales. Este artículo intenta desvelar cuáles son esos cambios que ha sufrido el periodismo colombiano, teniendo como base su relación con Twitter.

Relevância:

60.00% 60.00%

Publicador:

Relevância:

60.00% 60.00%

Publicador:

Resumo:

An introduction to computationally-enabled science, challenges, and opportunities.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Data management and sharing are relatively new concepts in the health and life sciences fields. This presentation will cover some basic policies as well as the impediments to data sharing unique to health and life sciences data.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

These Data Management Plans are more comprehensive and complex than in the past. Libraries around the nation are trying to put together tools to help researchers write plans that conform to the new requirements. This session will look at some of these tools.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Data collected under federally funded research is subject to compliance rules and regulations. Policies affecting what you can and cannot do with your data, who is responsible, and what role your institution plays can vary with funding agencies and the type of data collected. This talk will address many of the compliance issues associated with research data, as well as funder mandates that you need to be aware of to ensure compliance.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Geneva Henry, Executive Director of the Center for Digital Scholarship, Rice University. Data rights and ownership of digital research data can impact how you use data, how others use data you've collected, and how rights are determined in collaborative research. Copyright rules governing data vary from one country to the next, making data ownership in international collaborations particularly murky. Licensing the use of data sets from the start is one way to address these issues early and provide a means for easily sharing datasets that can be cited and properly attributed. This talk with introduce issues associated with digital research data governance and how to protect your rights with data you work with.

Relevância:

60.00% 60.00%

Publicador:

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This Article examines a problem in cybercrime law that is both persistent and pervasive. What counts as “communication” on the Internet? Defining the term is particularly important for crimes such as cyberstalking, cyberharassment, and cyberbullying, where most statutes require a showing that the alleged perpetrator “communicated” with the victim or impose a similar requirement through slightly different language. This Article takes up the important task of defining communication. As a foundation to our discussion, we provide the first comprehensive survey of state statutes and case law relating to cyberstalking, cyberharassment, and cyberbullying. We then examine the realities of the way people use the Internet to develop a definition of “communication” that reflects those realities. That is, we aim to provide effective tools by which prosecutors can address wrongful conduct without punishing innocuous behavior or chilling speech. We conclude by proposing a model statute that appropriately defines “communication.” We recommend that state legislatures adopt the statute or modify existing laws to match it in pertinent part and demonstrate how the statute would apply in a range of situations.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Las Universidades han tenido que adaptarse a los nuevos modelos de comunicación surgidos en la época de Internet. Dentro de estos nuevos paradigmas las redes sociales han irrumpido y Twitter se ha establecido como una de las más importantes. El objetivo de esta investigación es demostrar que existe una relación entre la presencia online de una Universidad, definida por la cantidad de información disponible en Internet, y su cuenta en Twitter. Para ello se analizó la relación entre la presencia online y los perfiles oficiales de las cinco universidades del País Vasco y Navarra. Los resultados demostraron la existencia de una correlación significativa entre la presencia online de las instituciones y el número de seguidores de sus respectivas cuentas. En segundo lugar, esta investigación se planteó si Twitter puede servir para potenciar la presencia online de una Universidad. Es por eso que se formuló una segunda hipótesis que buscaba analizar si tener varias cuentas en Twitter aumentaría la presencia online de las Universidades. Los hallazgos para esta segunda hipótesis demostraron una correlación muy significativa entre tener varios perfiles en Twitter y la presencia online de las Universidades. Así queda demostrada la importancia de la presencia online para las cuentas de Twitter y la relevancia de Twitter a la hora de potenciar la presencia online de los centros.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.