Search results for " protect"

showing 10 items of 1247 documents

Ethics in Legal Research

2023

The essay grapples with one of the most controversial issues about legal research, namely its complex ethical and methodological dimension—here argued to be comparative—assessing the high scientific value of studying law. After clarifying what differentiates such a field of research from other natural and social studies, the authors address the presence of secondary interests and the need to use personal data for scientific purposes, as relevant situations which could undermine the reliability of any legal research or allow its thoroughness at the risk of interfering with human rights. The adherence to a rigorous and effective method in investigating national and foreign law, and the compli…

Comparative MethodConflict of Interests in Legal ResearchSettore IUS/02 - Diritto Privato ComparatoComparative lawData Protection
researchProduct

Interrelation Between European Union Protection and National Protection

2014

In addition to registration requirements, registration procedure, and the protection of registered IGOs, namely PDOs and PGIs, as well as protected indications of origin (within the Aromatised Wines Regulation), the EU law on IGOs also includes the regulation of other aspects. Competence of state institutions of EU Member States to ensure the observance of the regulation of IGOs as it is provided in the EU law or interrelation with other EU legal acts relating to IGOs already discussed in Part II of this book should be mentioned among such aspects.

Competence (law)State (polity)Member statesmedia_common.quotation_subjectPolitical scienceEuropean integrationmedia_common.cataloged_instanceNational data protection authorityEuropean unionPublic administrationCommon Agricultural PolicyData Protection Directivemedia_common
researchProduct

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct

The Integration and Sharing of Resources for a New Quality of Living

2014

In questo capitolo, il tema della condivisione è trattato anche dal punto di vista giuridico attraverso una discussione caratterizzante il dibattito rilevante. Sono quindi approfondite le questioni inerenti le funzioni e la forma urbana. L’IT infatti può interagire con problemi operativi della città e con l’uso delle risorse ambientali (energia, suolo, acqua…), parametro indicativo su cui devono essere sviluppate le trasformazioni urbane. Come condividere gli spazi e le funzioni urbane costituisce la nuova frontiera nel campo dell’innovazione urbana. In this chapter, the issues of sharing of information and of information technologies use are dealt with from the juridical point of view, thr…

Computer sciencebusiness.industryEnergy (esotericism)Information technologyData securityEnergy consumptionEnvironmental economicsSettore ICAR/21 - Urbanisticacondivisione servizi e risorse aspetto giuridicoSmart gridSmart cityData Protection Act 1998sharing services and resources juridical aspectsSmart environmentbusiness
researchProduct

Enhanced islanding detection in smart interface protection systems of distributed generation

2021

The widespread presence of distributed generators (DGs) and storage systems (DSSs) in electricity grids has increased the risk of islanding occurrence. This phenomenon must be suitably managed by Distribution System Operators (DSO), in order to avoid adverse situations, in terms of grid-protection problems, equipment damage, safety hazards, power quality problems and so on. Currently anti-islanding protection functions are handled by interface protection systems (IPSs), which are built in accordance with relevant standards for DGs and DSSs connection to power systems. However, some problems may occur in case of operation within the so-called non detection zone (NDZ). This paper presents an …

Computer sciencebusiness.industryInterface (computing)distributed generation distribution network Interface protection systems islanding detection power system communications power system measurement smart gridsDirect-sequence spread spectrumProtection systemReliability engineeringSpread spectrumElectric power systemDistributed generationIslandingElectricitybusinessSettore ING-INF/07 - Misure Elettriche E Elettroniche2021 3rd Global Power, Energy and Communication Conference (GPECOM)
researchProduct

Key EU DEMO plant and building layout criteria

2021

Abstract An early attention to the layout of both plant site and its buildings is essential in a complex plant under preliminary design as DEMO in order to meet the assigned targets, namely i) the licensing requirements ii) a good availability in delivery electricity to the grid. The layout definition has to follow several criteria that become more complex and stringent for nuclear buildings, e.g. functional, maintenance, fire protection, safety, human factors, shielding, and remote handling. The criterion As Low As Reasonable Achievable, with respect to the dose to the staff, has to be applied in design, operation, maintenance and decommissioning phases. The tokamak building, where several…

Computer sciencemedia_common.quotation_subjectLayout criteria01 natural sciencesNuclear decommissioning010305 fluids & plasmasHazardous waste0103 physical sciencesFire protectionGeneral Materials Science010306 general physicsFunction (engineering)DEMOCivil and Structural Engineeringmedia_commonTokamak buildingbusiness.industryMechanical EngineeringReference designDEMO; Layout criteria; Safety; Tokamak buildingGridNuclear Energy and EngineeringKey (cryptography)Systems engineeringElectricitySafetybusinessFusion Engineering and Design
researchProduct

Differences in Immaterial Details: Dimensional Conversion and Its Implications for Protecting Digital Designs Under EU Design Law

2021

AbstractThe paper considers three main questions: the legal status of digital designs from the perspective of EU design law, whether the protection is tied to the reproduction of physical products, and whether the scope of protection covers dimensional conversion such as using a 3D design in 2D form or vice versa. There are two sets of views regarding dimensional conversion: the “abstract” and the “concrete” view. These two different attitudes towards the scope of protection influence the manner in which the protectability of digital designs is assessed. In the “abstract” protection, it would not matter whether a product only exists as a digital image and not as a physical shape. In the “co…

Computer sciencevideopelitReproduction (economics)pelisuunnitteluComputingMilieux_LEGALASPECTSOFCOMPUTINGIntellectual propertylimitationsDigital imageimmateriaalioikeusRelevance (law)scope of protectionProduct (category theory)mallisuojaScope (project management)mallioikeusJurisprudencePerspective (graphical)EU lawexceptionsvideo gamesdesignsmuotoiluLawPolitical Science and International RelationsLawdigitaaliset pelitIIC - International Review of Intellectual Property and Competition Law
researchProduct

Impact of European Data Protection Reform on direct marketing

2019

This study explored the influence of the legislation adopted under the EU Data Protection Reform on the direct marketing. Since the introduction of the previous data protection legislation, the amount of data collected, processed and stored has grown exponentially, resulting in the increased risk to the data security of an individual. Thereby, introduction of new rules is a necessity in order to achieve proper execution of data subject’s rights in the digital age and create efficient and simplified rules for the companies to apply. Direct marketing is based on the actions connected to personal information – data is gathered via cookies, stored for the purposes of communication and analyzed …

ComputingMilieux_LEGALASPECTSOFCOMPUTINGDirect marketing:LAW/JURISPRUDENCE::Other law::European law [Research Subject Categories]Data protection
researchProduct

Algorithms, Artificial Intelligence and Automated Decisions about Workers and the Risks of Discrimination: The Necessary Collective Governance of Dat…

2018

Big data, algorithms and artificial intelligence currently allow entrepreneurs to process information about their employees in a far more efficient manner and at a much lower cost than has been the case until now. This makes it possible to profile workers automatically and even allows technology itself to replace human resources supervisors and managers and to make decisions that have legal effects on the employees (recruitment, promotion, dismissals, etc.). This entails great risks of discrimination by the technology in command, as well as the defencelessness of the worker, who is unaware of the reasons underlying such a decision. This study analyses the guarantees established in the exist…

ComputingMilieux_THECOMPUTINGPROFESSIONbusiness.industryCorporate governancemedia_common.quotation_subjectBig dataSafeguardingPromotion (rank)Data Protection Act 1998Profiling (information science)Lower costBusinessArtificial intelligenceHuman resourcesAlgorithmmedia_commonSSRN Electronic Journal
researchProduct

La precariedad laboral en inmigrantes en situación irregular en España y su relación con la salud

2009

ResumenObjetivoDescribir las características de la precariedad laboral en inmigrantes irregulares en España y su relación con la salud.MétodosEstudio cualitativo que utiliza los principios de la inducción analítica. Se definió una submuestra del proyecto ITSAL, cuya muestra teórica se identificó a partir de la definición de inmigrante en España y de la literatura. Las áreas de estudio fueron 4 ciudades de España. La muestra final fue de 44 trabajadores inmigrantes irregulares, de 4 nacionalidades.ResultadosAlgunas características de la precariedad laboral percibidas por los inmigrantes irregulares fueron: elevada inestabilidad laboral; ausencia total de empoderamiento en tanto no cuentan co…

Condiciones de empleomedia_common.quotation_subjectPrecarious EmploymentMigraciónImmigrationVulnerabilityPublic Health Environmental and Occupational HealthProtección socialSaludEmployment conditionsFocus groupSocial protectionLegal protectionWork (electrical)NursingHealthPolitical scienceAnalytic inductionSituación legalDemographic economicsLegal statusMigrationmedia_commonQualitative researchGaceta Sanitaria
researchProduct