Search results for "Data Protection Act 1998"

showing 10 items of 30 documents

Self-validating bundles for flexible data access control

2016

Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…

021110 strategic defence & security studiesbundle information-centric security access policy bytecodeComputer sciencebusiness.industrySettore ING-INF/03 - Telecomunicazioni0211 other engineering and technologies020207 software engineeringAccess controlCloud computing02 engineering and technologyClient-sideComputer securitycomputer.software_genreMetadataData access0202 electrical engineering electronic engineering information engineeringData Protection Act 1998businesscomputerAccess structure
researchProduct

COVID-19 Contact Tracing and Data Protection Can Go Together

2020

We discuss the implementation of app-based contact tracing to control the coronavirus disease (COVID-19) pandemic and discuss its data protection and user acceptability aspects.

2019-20 coronavirus outbreakCoronavirus disease 2019 (COVID-19)Computer scienceSevere acute respiratory syndrome coronavirus 2 (SARS-CoV-2)Pneumonia ViralPatient rightsHealth InformaticsInformation technologyprivacycontact tracingDisease OutbreaksBetacoronavirusHuman–computer interactionHumansData Protection Act 1998Guest Editorialproximity tracingPandemicsappComputer Securitydata protectionUser acceptabilitySARS-CoV-2BluetoothCOVID-19T58.5-58.64Mobile ApplicationsPatient RightsGeographic Information SystemsSmartphonePublic aspects of medicineRA1-1270Coronavirus InfectionsContact tracingCoronavirus InfectionsJMIR mHealth and uHealth
researchProduct

Telemedicine and COVID-19 pandemic: The perfect storm to mark a change in diabetes care. Results from a world-wide cross-sectional web-based survey

2021

Abstract Background Telemedicine for routine care of people with diabetes (PwD) during the COVID‐19 pandemic rapidly increased in many countries, helping to address the several barriers usually seen. Objective This study aimed to describe healthcare professionals' (HCPs) experience on telemedicine use in diabetes care and investigate the changes and challenges associated with its implementation. Methods A cross‐sectional electronic survey was distributed through the global network of JENIOUS members of ISPAD. Respondents' professional and practice profiles, clinic sizes, their country of practice, and data regarding local telemedicine practices during COVID‐19 pandemic were investigated. Re…

AdultMaleTelemedicineClinical Care and TechnologyInternationalityCoronavirus disease 2019 (COVID-19)pediatricstelehealthtype 1 diabetesHealth PersonnelEndocrinology Diabetes and MetabolismTelehealthCOVID‐19Surveys and QuestionnairesGlobal networkPandemicDiabetes MellitusInternal MedicinemedicineHumansData Protection Act 1998PandemicsReimbursementAgedAged 80 and overInternetbusiness.industryCOVID-19Middle Agedmedicine.diseaseWorld wideCross-Sectional StudiesPrivacyPediatrics Perinatology and Child HealthFemalevirtualMedical emergencytelemedicinebusinessPediatric Diabetes
researchProduct

The security of mobile business applications based on mCRM

2020

A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…

Attack treesInformation securityComputer science05 social sciencesAttack treeData securityMobile application02 engineering and technologyInformation securityComputer securitycomputer.software_genreSoftware security assurance020204 information systems0502 economics and businessThreat model0202 electrical engineering electronic engineering information engineeringSecurityData Protection Act 1998050211 marketingMobile technologyThreat modelingMobile devicecomputermCRM
researchProduct

The Integration and Sharing of Resources for a New Quality of Living

2014

In questo capitolo, il tema della condivisione è trattato anche dal punto di vista giuridico attraverso una discussione caratterizzante il dibattito rilevante. Sono quindi approfondite le questioni inerenti le funzioni e la forma urbana. L’IT infatti può interagire con problemi operativi della città e con l’uso delle risorse ambientali (energia, suolo, acqua…), parametro indicativo su cui devono essere sviluppate le trasformazioni urbane. Come condividere gli spazi e le funzioni urbane costituisce la nuova frontiera nel campo dell’innovazione urbana. In this chapter, the issues of sharing of information and of information technologies use are dealt with from the juridical point of view, thr…

Computer sciencebusiness.industryEnergy (esotericism)Information technologyData securityEnergy consumptionEnvironmental economicsSettore ICAR/21 - Urbanisticacondivisione servizi e risorse aspetto giuridicoSmart gridSmart cityData Protection Act 1998sharing services and resources juridical aspectsSmart environmentbusiness
researchProduct

Algorithms, Artificial Intelligence and Automated Decisions about Workers and the Risks of Discrimination: The Necessary Collective Governance of Dat…

2018

Big data, algorithms and artificial intelligence currently allow entrepreneurs to process information about their employees in a far more efficient manner and at a much lower cost than has been the case until now. This makes it possible to profile workers automatically and even allows technology itself to replace human resources supervisors and managers and to make decisions that have legal effects on the employees (recruitment, promotion, dismissals, etc.). This entails great risks of discrimination by the technology in command, as well as the defencelessness of the worker, who is unaware of the reasons underlying such a decision. This study analyses the guarantees established in the exist…

ComputingMilieux_THECOMPUTINGPROFESSIONbusiness.industryCorporate governancemedia_common.quotation_subjectBig dataSafeguardingPromotion (rank)Data Protection Act 1998Profiling (information science)Lower costBusinessArtificial intelligenceHuman resourcesAlgorithmmedia_commonSSRN Electronic Journal
researchProduct

PLC security and critical infrastructure protection

2013

Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to it…

Control system securityEngineeringbusiness.industryProgrammable logic controllerCritical infrastructure protectionIndustrial control systemComputer securitycomputer.software_genreStuxnetCritical infrastructureData Protection Act 1998Isolation (database systems)businesscomputer2013 IEEE 8th International Conference on Industrial and Information Systems
researchProduct

Artificial Intelligence for Hospital Health Care:Application Cases and Answers to Challenges in European Hospitals

2021

The development and implementation of artificial intelligence (AI) applications in health care contexts is a concurrent research and management question. Especially for hospitals, the expectations regarding improved efficiency and effectiveness by the introduction of novel AI applications are huge. However, experiences with real-life AI use cases are still scarce. As a first step towards structuring and comparing such experiences, this paper is presenting a comparative approach from nine European hospitals and eleven different use cases with possible application areas and benefits of hospital AI technologies. This is structured as a current review and opinion article from a diverse range of…

Coronavirus disease 2019 (COVID-19)Leadership and ManagementData managementmedia_common.quotation_subject610 Medicine & healthHealth InformaticsArticle03 medical and health sciences0302 clinical medicineHealth Information ManagementSDG 3 - Good Health and Well-beingPandemicHealth careData Protection Act 1998Use case030212 general & internal medicine610 Medicine & healthmedia_commonbusiness.industryHealth PolicyRCOVID-19benefitsartificial intelligenceEuropean hospitalsuses casesArtificial intelligence; Benefits; COVID-19; European hospitals; Uses casesMedicine/dk/atira/pure/sustainabledevelopmentgoals/good_health_and_well_beingArtificial intelligenceApplications of artificial intelligencebusiness030217 neurology & neurosurgeryDiversity (politics)
researchProduct

Credit-Based Insurance Scores: some Observations in the Light of the European General Data Protection Regulation

2020

Despite the differences between credit risk and insurance risk, in many countries large insurance companies include credit history amongst the information to be taken into account when assigning consumers to risk pools and deciding whether or not to offer them an auto or homeowner insurance policy, or to determine the premium that they should pay. In this study, I will try to establish some conclusions concerning the requirements and limits that the use of credit history data by insurers in the European Union should be subject to. In order to do this, I shall focus my attention primarily on Regulation (EU) 2016/679. This regulation, that came into force on 24 May 2018, not only forms the ba…

Cultural StudiesHistoryActuarial scienceEconomics Econometrics and Finance (miscellaneous)Credit historyOrder (exchange)General Data Protection RegulationInsurance policyPolitical Science and International Relationsmedia_common.cataloged_instanceData Protection Act 1998BusinessRisk poolEuropean unionLawCredit riskmedia_commonCuadernos Europeos de Deusto
researchProduct

USEDAT: USA-Europe Data Analysis Training Worldwide Program, 2019 ed.

2019

USA-Europe Data Analysis Training School (USEDAT) is a Multi-center Trans-Atlantic initiative offering hands-on training focused in both Introduction to Experimental Data Recording (NMR, MS, IR, 2DGE, EEG, etc.) and/or posterior Computational Data Analysis (Machine Learning, Complex Networks, etc.). We made emphasis on applications in for Cheminformatics, Bioinformatics, Medicinal Chemistry, Nanotechnology, Systems Biology, Biomedical Engineering, etc. The school also promotes training and knowledge of ethical and legal regulatory issues (GDPR, REACH, OECD, FDA, etc.) about data use and data protection in chemistry and biomedical research. The school is directed to researchers and students …

Engineeringbusiness.industry4. Education[SDV]Life Sciences [q-bio]Experimental data02 engineering and technology021001 nanoscience & nanotechnologyTraining (civil)Data science[SPI]Engineering Sciences [physics]Cheminformatics0202 electrical engineering electronic engineering information engineeringData Protection Act 1998[CHIM]Chemical Sciences020201 artificial intelligence & image processing[INFO]Computer Science [cs]0210 nano-technologybusinessComputingMilieux_MISCELLANEOUS
researchProduct