Search results for "Data Protection"

showing 10 items of 73 documents

PLC security and critical infrastructure protection

2013

Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to it…

Control system securityEngineeringbusiness.industryProgrammable logic controllerCritical infrastructure protectionIndustrial control systemComputer securitycomputer.software_genreStuxnetCritical infrastructureData Protection Act 1998Isolation (database systems)businesscomputer2013 IEEE 8th International Conference on Industrial and Information Systems
researchProduct

Artificial Intelligence for Hospital Health Care:Application Cases and Answers to Challenges in European Hospitals

2021

The development and implementation of artificial intelligence (AI) applications in health care contexts is a concurrent research and management question. Especially for hospitals, the expectations regarding improved efficiency and effectiveness by the introduction of novel AI applications are huge. However, experiences with real-life AI use cases are still scarce. As a first step towards structuring and comparing such experiences, this paper is presenting a comparative approach from nine European hospitals and eleven different use cases with possible application areas and benefits of hospital AI technologies. This is structured as a current review and opinion article from a diverse range of…

Coronavirus disease 2019 (COVID-19)Leadership and ManagementData managementmedia_common.quotation_subject610 Medicine & healthHealth InformaticsArticle03 medical and health sciences0302 clinical medicineHealth Information ManagementSDG 3 - Good Health and Well-beingPandemicHealth careData Protection Act 1998Use case030212 general & internal medicine610 Medicine & healthmedia_commonbusiness.industryHealth PolicyRCOVID-19benefitsartificial intelligenceEuropean hospitalsuses casesArtificial intelligence; Benefits; COVID-19; European hospitals; Uses casesMedicine/dk/atira/pure/sustainabledevelopmentgoals/good_health_and_well_beingArtificial intelligenceApplications of artificial intelligencebusiness030217 neurology & neurosurgeryDiversity (politics)
researchProduct

Credit-Based Insurance Scores: some Observations in the Light of the European General Data Protection Regulation

2020

Despite the differences between credit risk and insurance risk, in many countries large insurance companies include credit history amongst the information to be taken into account when assigning consumers to risk pools and deciding whether or not to offer them an auto or homeowner insurance policy, or to determine the premium that they should pay. In this study, I will try to establish some conclusions concerning the requirements and limits that the use of credit history data by insurers in the European Union should be subject to. In order to do this, I shall focus my attention primarily on Regulation (EU) 2016/679. This regulation, that came into force on 24 May 2018, not only forms the ba…

Cultural StudiesHistoryActuarial scienceEconomics Econometrics and Finance (miscellaneous)Credit historyOrder (exchange)General Data Protection RegulationInsurance policyPolitical Science and International Relationsmedia_common.cataloged_instanceData Protection Act 1998BusinessRisk poolEuropean unionLawCredit riskmedia_commonCuadernos Europeos de Deusto
researchProduct

Politics of Cultural Marking in Mini-Europe: Anchoring European Cultural Identity in a Theme Park

2012

Mini-Europe—a theme park in Brussels morally supported by the European Commission and the European Parliament—consists of around 350 models of different buildings and heritage sites from all the member states of the European Union. In addition the park includes an exhibition named the Spirit of Europe. The article explores how the European cultural identity is constructed and ‘sold’ in Mini-Europe, and how history, geography and local and regional traditions are intertwined into a politics of cultural marking, an ideology of European integration and a creation of shared symbols. European cultural identity has often been generated through appeals to an ancient or classical past, which is pro…

Cultural StudiesSociology and Political ScienceCultural identitymedia_common.quotation_subjectMedia studiesEuropean studiesData Protection DirectiveExhibitionPoliticsLawta6131Political Science and International RelationsEuropean integrationmedia_common.cataloged_instanceSociologyIdeologyEuropean unionmedia_commonJournal of Contemporary European Studies
researchProduct

Protection of Personal Data and Human Rights between the ECHR and the EU Legal Order

2020

The present paper deals with the relationship between privacy and data protection, having regard to the European Union and the European Convention of Human Rights. Such an analysis moves from the normative context (art. 8 ECHR and art. 7 and 8 of the Charter of Fundamental Rights of the European Union). Moreover, the case law of the Court of Justice of the European Union and of the European Court of Human RIghts is taken into account, in order to enlighten the dfferent scopes of privacy and data protection.

Data Protection Privacy European Court of Human Rights European Court of Justice scope of art. 8 ECHR scope of art 7 and 8 of the Charter of Nice.Settore IUS/13 - Diritto Internazionale
researchProduct

Noziedzīgi nodarījumi pret informācijas sistēmu drošību (kibernoziegumi)

2005

DatornoziegumiInformācijas sistēmu drošībaComputer crimeCybercrime:LAW/JURISPRUDENCE::Criminal law [Research Subject Categories]Noziedzīgi nodarījumi pret informācijas sistēmu drošībuHakeriVirtual crimeKriminālatbildībaComputers lawKiberterorismsPatvaļīga piekļuve datorsistēmaiKibernoziegumiData protection
researchProduct

Control empresarial del uso de dispositivos digitales en el ámbito laboral desde la perspectiva del derecho a la protección de datos y a la intimidad

2020

Los avances tecnológicos no sólo han permitido una evolución en los procesos productivos o en la forma organizativa y de trabajar de las empresas, sino que también han posibilitado que éstas escojan nuevas formas y métodos de supervisión de la actividad laboral más invasivos, que, en ocasiones, entran en colisión con los derechos fundamentales de los trabajadores, entre ellos, el derecho a la protección de datos y el derecho a la intimidad. La vigente Ley de Protección de Datos destina algunos preceptos a regular el control y acceso por parte de la empresa a los dispositivos digitales facilitados al trabajador. El presente trabajo analiza estos preceptos y los rasgos más destacados de su ré…

Employer controlWork activityControl empresarialIntimidadPrivacyPolitical scienceProtección de datosHumanitiesData Protection
researchProduct

USEDAT: USA-Europe Data Analysis Training Worldwide Program, 2019 ed.

2019

USA-Europe Data Analysis Training School (USEDAT) is a Multi-center Trans-Atlantic initiative offering hands-on training focused in both Introduction to Experimental Data Recording (NMR, MS, IR, 2DGE, EEG, etc.) and/or posterior Computational Data Analysis (Machine Learning, Complex Networks, etc.). We made emphasis on applications in for Cheminformatics, Bioinformatics, Medicinal Chemistry, Nanotechnology, Systems Biology, Biomedical Engineering, etc. The school also promotes training and knowledge of ethical and legal regulatory issues (GDPR, REACH, OECD, FDA, etc.) about data use and data protection in chemistry and biomedical research. The school is directed to researchers and students …

Engineeringbusiness.industry4. Education[SDV]Life Sciences [q-bio]Experimental data02 engineering and technology021001 nanoscience & nanotechnologyTraining (civil)Data science[SPI]Engineering Sciences [physics]Cheminformatics0202 electrical engineering electronic engineering information engineeringData Protection Act 1998[CHIM]Chemical Sciences020201 artificial intelligence & image processing[INFO]Computer Science [cs]0210 nano-technologybusinessComputingMilieux_MISCELLANEOUS
researchProduct

Fiscal visibility in the U.S. and the European Union

2001

European Union lawEconomics and Econometricsbusiness.industryInternational tradeFiscal unionData Protection DirectivePolitical scienceRegionalism (international relations)European integrationSingle Euro Payments Areamedia_common.cataloged_instanceEuropean unionbusinessGeneral Economics Econometrics and Financemedia_commonEuropean debt crisisInternational Advances in Economic Research
researchProduct

European Union Protection System

2014

Traditionally, the EU law (characterised as acquis communautaire) is divided into the primary law and the secondary law. This distinction of the EU law is not based on a hierarchy of norms but, as it is justly admitted in the legal literature, on sources: if the EU primary law originates from the EU Member States as ‘Masters of the Treaty’, the EU secondary law—directly from EU institutions. In the case of IGOs (as well as other IP objects such as trade marks, designs, patents, and plant variety rights), their regulation is ensured both by the EU primary law and the EU secondary law which will be reviewed separately in Part II of the book.

European Union lawbusiness.industryInternational tradeNational data protection authorityPrimary authorityData Protection DirectiveGeneral Data Protection RegulationPolitical scienceEuropean integrationSingle Euro Payments Areamedia_common.cataloged_instanceEuropean unionbusinessmedia_common
researchProduct