Search results for "1998"

showing 10 items of 44 documents

Self-validating bundles for flexible data access control

2016

Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…

021110 strategic defence & security studiesbundle information-centric security access policy bytecodeComputer sciencebusiness.industrySettore ING-INF/03 - Telecomunicazioni0211 other engineering and technologies020207 software engineeringAccess controlCloud computing02 engineering and technologyClient-sideComputer securitycomputer.software_genreMetadataData access0202 electrical engineering electronic engineering information engineeringData Protection Act 1998businesscomputerAccess structure
researchProduct

COVID-19 Contact Tracing and Data Protection Can Go Together

2020

We discuss the implementation of app-based contact tracing to control the coronavirus disease (COVID-19) pandemic and discuss its data protection and user acceptability aspects.

2019-20 coronavirus outbreakCoronavirus disease 2019 (COVID-19)Computer scienceSevere acute respiratory syndrome coronavirus 2 (SARS-CoV-2)Pneumonia ViralPatient rightsHealth InformaticsInformation technologyprivacycontact tracingDisease OutbreaksBetacoronavirusHuman–computer interactionHumansData Protection Act 1998Guest Editorialproximity tracingPandemicsappComputer Securitydata protectionUser acceptabilitySARS-CoV-2BluetoothCOVID-19T58.5-58.64Mobile ApplicationsPatient RightsGeographic Information SystemsSmartphonePublic aspects of medicineRA1-1270Coronavirus InfectionsContact tracingCoronavirus InfectionsJMIR mHealth and uHealth
researchProduct

Evolución y distribución sectorial de las fusiones de empresas españolas

2000

Es evidente que los procedimientos de fusión han sido empleados por las empresas españolas como estrategias para afrontar los retos competitivos en sus diferentes entornos económicos y, aunque han sido estudiados sus causas y resultados; el impacto global en el contexto de la economía española y su utilización real no han sido suficientemente investigados, sobre todo, debido a la falta de bases estadísticas apropiadas. En este trabajo, partiendo de la información de las últimas dos décadas, se analiza cuál ha sido su empleo efectivo, características y evolución, así como aquellos sectores más intensamente afectados. Para obtener una base que permita vislumbrar las posibles tendencias futura…

:CIENCIAS ECONÓMICAS::Economía general [UNESCO]EspañaReestructuración empresarialFusiones; Adquisiciones; Reestructuración empresarial; España; 1980-19981980-1998FusionesUNESCO::CIENCIAS ECONÓMICAS::Economía generalAdquisiciones
researchProduct

Telemedicine and COVID-19 pandemic: The perfect storm to mark a change in diabetes care. Results from a world-wide cross-sectional web-based survey

2021

Abstract Background Telemedicine for routine care of people with diabetes (PwD) during the COVID‐19 pandemic rapidly increased in many countries, helping to address the several barriers usually seen. Objective This study aimed to describe healthcare professionals' (HCPs) experience on telemedicine use in diabetes care and investigate the changes and challenges associated with its implementation. Methods A cross‐sectional electronic survey was distributed through the global network of JENIOUS members of ISPAD. Respondents' professional and practice profiles, clinic sizes, their country of practice, and data regarding local telemedicine practices during COVID‐19 pandemic were investigated. Re…

AdultMaleTelemedicineClinical Care and TechnologyInternationalityCoronavirus disease 2019 (COVID-19)pediatricstelehealthtype 1 diabetesHealth PersonnelEndocrinology Diabetes and MetabolismTelehealthCOVID‐19Surveys and QuestionnairesGlobal networkPandemicDiabetes MellitusInternal MedicinemedicineHumansData Protection Act 1998PandemicsReimbursementAgedAged 80 and overInternetbusiness.industryCOVID-19Middle Agedmedicine.diseaseWorld wideCross-Sectional StudiesPrivacyPediatrics Perinatology and Child HealthFemalevirtualMedical emergencytelemedicinebusinessPediatric Diabetes
researchProduct

The security of mobile business applications based on mCRM

2020

A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…

Attack treesInformation securityComputer science05 social sciencesAttack treeData securityMobile application02 engineering and technologyInformation securityComputer securitycomputer.software_genreSoftware security assurance020204 information systems0502 economics and businessThreat model0202 electrical engineering electronic engineering information engineeringSecurityData Protection Act 1998050211 marketingMobile technologyThreat modelingMobile devicecomputermCRM
researchProduct

Influencia y sensibilidad de los mercados bursátiles europeos.

1999

Este trabajo analiza las relaciones entre los mercados bursátiles europeos y los de Nueva York y Tokio, durante el período 1988-1998. La no coincidencia de los horarios de negociación entre estos mercados determina los resultados de los análisis de correlación y de regresión con rendimientos diarios de los índices bursátiles de cada mercado de valores. Con el fin de solucionar éste y otros inconvenientes se contrasta el modelo propuesto por Peiró et al. (1998), que permite distinguir entre la capacidad de influir de un mercado sobre otro y la sensibilidad de ser influido por el resto de los mercados. Los resultados, en moneda local, indican que el mercado más influyente es Nueva York, mient…

BolsaRelaciones económicas internacionales:CIENCIAS ECONÓMICAS::Economía general [UNESCO]Relaciones monetarias internacionalesMercado de valoresÍndices bursátilesTipo de cambioRelaciones económicas internacionales; Relaciones monetarias internacionales; Mercado de valores; Bolsa; Índices bursátiles; Tipo de cambio; 1988-19981988-1998UNESCO::CIENCIAS ECONÓMICAS::Economía general
researchProduct

The Integration and Sharing of Resources for a New Quality of Living

2014

In questo capitolo, il tema della condivisione è trattato anche dal punto di vista giuridico attraverso una discussione caratterizzante il dibattito rilevante. Sono quindi approfondite le questioni inerenti le funzioni e la forma urbana. L’IT infatti può interagire con problemi operativi della città e con l’uso delle risorse ambientali (energia, suolo, acqua…), parametro indicativo su cui devono essere sviluppate le trasformazioni urbane. Come condividere gli spazi e le funzioni urbane costituisce la nuova frontiera nel campo dell’innovazione urbana. In this chapter, the issues of sharing of information and of information technologies use are dealt with from the juridical point of view, thr…

Computer sciencebusiness.industryEnergy (esotericism)Information technologyData securityEnergy consumptionEnvironmental economicsSettore ICAR/21 - Urbanisticacondivisione servizi e risorse aspetto giuridicoSmart gridSmart cityData Protection Act 1998sharing services and resources juridical aspectsSmart environmentbusiness
researchProduct

Algorithms, Artificial Intelligence and Automated Decisions about Workers and the Risks of Discrimination: The Necessary Collective Governance of Dat…

2018

Big data, algorithms and artificial intelligence currently allow entrepreneurs to process information about their employees in a far more efficient manner and at a much lower cost than has been the case until now. This makes it possible to profile workers automatically and even allows technology itself to replace human resources supervisors and managers and to make decisions that have legal effects on the employees (recruitment, promotion, dismissals, etc.). This entails great risks of discrimination by the technology in command, as well as the defencelessness of the worker, who is unaware of the reasons underlying such a decision. This study analyses the guarantees established in the exist…

ComputingMilieux_THECOMPUTINGPROFESSIONbusiness.industryCorporate governancemedia_common.quotation_subjectBig dataSafeguardingPromotion (rank)Data Protection Act 1998Profiling (information science)Lower costBusinessArtificial intelligenceHuman resourcesAlgorithmmedia_commonSSRN Electronic Journal
researchProduct

PLC security and critical infrastructure protection

2013

Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to it…

Control system securityEngineeringbusiness.industryProgrammable logic controllerCritical infrastructure protectionIndustrial control systemComputer securitycomputer.software_genreStuxnetCritical infrastructureData Protection Act 1998Isolation (database systems)businesscomputer2013 IEEE 8th International Conference on Industrial and Information Systems
researchProduct

Artificial Intelligence for Hospital Health Care:Application Cases and Answers to Challenges in European Hospitals

2021

The development and implementation of artificial intelligence (AI) applications in health care contexts is a concurrent research and management question. Especially for hospitals, the expectations regarding improved efficiency and effectiveness by the introduction of novel AI applications are huge. However, experiences with real-life AI use cases are still scarce. As a first step towards structuring and comparing such experiences, this paper is presenting a comparative approach from nine European hospitals and eleven different use cases with possible application areas and benefits of hospital AI technologies. This is structured as a current review and opinion article from a diverse range of…

Coronavirus disease 2019 (COVID-19)Leadership and ManagementData managementmedia_common.quotation_subject610 Medicine & healthHealth InformaticsArticle03 medical and health sciences0302 clinical medicineHealth Information ManagementSDG 3 - Good Health and Well-beingPandemicHealth careData Protection Act 1998Use case030212 general & internal medicine610 Medicine & healthmedia_commonbusiness.industryHealth PolicyRCOVID-19benefitsartificial intelligenceEuropean hospitalsuses casesArtificial intelligence; Benefits; COVID-19; European hospitals; Uses casesMedicine/dk/atira/pure/sustainabledevelopmentgoals/good_health_and_well_beingArtificial intelligenceApplications of artificial intelligencebusiness030217 neurology & neurosurgeryDiversity (politics)
researchProduct