Search results for " privacy"
showing 10 items of 318 documents
Available Defences in Provisional measures: Between the Enforcement Directive and National law
2015
AbstractThe EU Enforcement Directive provides a set of provisional measures to be applied upon request from a right-holder of a particular object of intellectual property. Simultaneously, the EU Enforcement Directive envisages a set of defences for an alleged infringer (defendant) in order to safeguard the balance of the parties. This article discusses available defences for an alleged infringer in the provisional measures as provided by the EU Member States when the norms of the EU Enforcement Directive are transposed. Specifically, the present article not only focuses on the threshold of evidence to be presented by a plaintiff for the application of provisional measures, but also in regar…
Reverse-safe data structures for text indexing
2021
We introduce the notion of reverse-safe data structures. These are data structures that prevent the reconstruction of the data they encode (i.e., they cannot be easily reversed). A data structure D is called z-reverse-safe when there exist at least z datasets with the same set of answers as the ones stored by D. The main challenge is to ensure that D stores as many answers to useful queries as possible, is constructed efficiently, and has size close to the size of the original dataset it encodes. Given a text of length n and an integer z, we propose an algorithm which constructs a z-reverse-safe data structure that has size O(n) and answers pattern matching queries of length at most d optim…
Privacy Violation Classification of Snort Ruleset
2010
Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…
Hand-Held texting is less distracting than texting with the phone in a holder: anyway, don't do it
2015
We studied the effects of texting while driving and the effects of mobile phone position (hand-held, holder) on drivers' lane-keeping performance, experienced workload, and in-car glance durations in a motion-platform driving simulator with 24 participants. Overall, we found the known negative effects of texting on lane-keeping performance, workload, and visual attention on road, suggesting that texting on the road in any manner is not risk-free. As a novel finding, we found that hand-held texting led to fewer lane-keeping errors and shorter total glance times off road compared to texting with the phone in a holder. We suggest the explanation is that the drivers had considerably more experi…
A status report
1992
Abstract This article considers the financial and proprietary considerations applicable to computer crime, computer security and personal privacy. The failure to take proper precautions in these areas can lead to major operational problems and substantial loss of assets. Developments in the late 1980s, particulary the discovery by the public press of so-called ‘computer viruses’, indicates the need for counsel representing suppliers and users to understand the basic technology involved and the legal implications. Such a report by Robert Bigelow was first published in CLSR in March 1989. He has now updated and revised the text which will be featured in several parts. In the first parts the l…
El fundamento liberal del derecho a la intimidad
2021
T: The right to privacy is configured as a ?retaining wall? against State interference into the private sphere of people?s life. Throughout this work we will try to expose the philosophical-liberal foundations that have led us to what is now conceived as the ?right to privacy?.
Quando la macchina organizza il lavoratore. Spunti su eterodirezione e sistema voice-picking nei contratti di appalto
2022
Nel presente contributo, dopo aver dato atto, per cenni, degli orientamenti giurisprudenziali più recenti in tema di interposizione illecita di manodopera, forniscono alcuni spunti di riflessione in merito al problematico utilizzo, negli appalti ad alta intensità di manodopera nel settore della logistica, del sistema c.d. voice-picking, con cui il personale adibito alle lavorazioni nei magazzini viene guidato da una voce sintetizzata nell’esecuzione della prestazione lavorativa. In this contribution, after acknowledging, for hints, the most recent jurisprudential guidelines on the subject of the illegal interposition of manpower, they provide some food for thought on the problematic use, in…
From Consuming Printed News to Making Online Journalism?
2001
Detection of Fake Profiles in Social Media - Literature Review
2017
Derecho de los hijos nacidos por reproducción asistida a conocer la identidad de sus padres biológicos: Breves reflexiones y propuestas
2018
The present communication intends to analyze and reflect on the existing problem and the conflict of rights produced regarding the need of information of a son to know the identity of his biological parents, possible discrimination by birth. Comparative law. Analysis of the right to personal and family privacy, and right to Identity. Consideration of public information as an essential element of the practice of techniques