Search results for "PRIVACY"

showing 10 items of 402 documents

Science integrity has been never more important: It's all about trust.

2021

Publishing2019-20 coronavirus outbreakBiomedical ResearchCoronavirus disease 2019 (COVID-19)business.industrySevere acute respiratory syndrome coronavirus 2 (SARS-CoV-2)Internet privacyScientific MisconductCell BiologyTrustBiochemistryEthics ResearchPolitical scienceHumansPeriodicals as TopicbusinessMolecular BiologyJournal of cellular biochemistryREFERENCES
researchProduct

“Think. Check. Submit.” to avoid predatory publishing

2018

PublishingLetter040301 veterinary sciencesbusiness.industryInternet privacylcsh:Medical emergencies. Critical care. Intensive care. First aidlcsh:RC86-88.904 agricultural and veterinary sciencesCritical Care and Intensive Care Medicine0403 veterinary science03 medical and health sciences0302 clinical medicinePredatory publishingHumansMedicine030212 general & internal medicinePeriodicals as TopicbusinessCritical Care
researchProduct

RISERVATEZZA E PRIVACY: UN'INDAGINE COMPARATISTICA

2012

La ricerca svolta ha consentito di trovare interessanti punti di contatto tra i sistemi di civil law, in particolare quello italiano, sul quale ha giocato un ruolo determinante l’ordinamento europeo, ed i sistemi di common law, in particolare quello americano e inglese. Qualunque tesi si possa condividere sulle origini italiane del diritto alla privacy – elaborazione graduale dell’originario concetto di identità personale o piuttosto trapianto dell’istituto americano del "right to let be alone" – restano da affrontare basilari questioni di "policy" circa la disciplina di un diritto dalla struttura poliedrica e complessa che finora ha trovato più agevolmente riconoscimento formale in una dim…

RISERVATEZZAPRIVACYSettore IUS/02 - Diritto Privato Comparato
researchProduct

Mass phone surveillance programs – security vs. civil liberties?

2017

Following September 11 attacks, America has increased its intelligence and defense capabilities. In particular, a historic law named USA Patriot Act was passed by Bush administration together with President’s Surveillance Program. Though the emotional trauma and immediate strategic need to defend the homeland is understandable as it is commendable that the law was passed relatively quick, the Constitution of the United States is what makes this nation so developed and great. This inquiry will take a deep look into the law in relation to unwarranted surveillance over phone activities of the people and assess its constitutionality. To support the assessment, the development of the relevant la…

Rights to privacy:LAW/JURISPRUDENCE::Other law::International private law and international procedural law [Research Subject Categories]United States of America
researchProduct

Mobility and Spatio-Temporal Exposure Control

2013

Modern risk assessment methods cover many issues and encompass both risk analysis and corresponding prevention/mitigation measures.However, there is still room for improvement and one aspect that may benefit from more work is “exposure control”.The “exposure” an asset experiences plays an important part in the risks facing the asset.Amongst the aspects that all too regularly get exposed is user identities and user location information,and in a context with mobile subscriber and mobility in the service hosting (VM migration/mobility) the problems associated with lost identity/location privacy becomes urgent.In this paper we look at “exposure control” as a way for analyzing and protecting use…

Risk analysisService (systems architecture)Cover (telecommunications)Computer Networks and Communicationsbusiness.industryInternet privacyContext (language use)Cloud computingComputer securitycomputer.software_genreAsset (computer security)Hardware and ArchitectureRoamingbusinesscomputerVulnerability (computing)Journal of Cyber Security and Mobility
researchProduct

The Law of Service Robots

2014

Il settore della robotica attiene alla progettazione e costruzione di un complesso variegato ed eterogeneo di macchine, quali robot, soldati e chirurghi, sistemi automatizzati di trasporto aereo, terrestre e marittimo, applicazioni industriali nell’ambito manifatturiero o nella agricoltura, robotica di servizio e altro ancora. Si tratta di un settore per eccellenza interdisciplinare la varietà di ambiti e applicazioni del quale fa sì che si discuta ancora sulla definizione di robot e su alcune sue proprietà: l’autonomia, l’adattatività o i gradi di interattività. Su queste basi, il problema, attualmente, non è tanto quello di determinare se e in che modo i robot ”agiscano”; la questione ver…

Robots drones remotely piloted aerial systems ENAC liability privacy data protection commons intellectual property digital forensics cyber-security criminal liabilitySettore IUS/01 - Diritto Privato
researchProduct

Do Women in Nepal Like Playing a Mobile Game? MANTRA: A Mobile Gamified App for Improving Healthcare Seeking Behavior in Rural Nepal

2021

In Low and Middle Income Countries (LMIC), one of the causes of maternal and child mortality is a lack of medical knowledge and consequently the inability to seek timely healthcare. Mobile health (mHealth) technology is gradually becoming a universal intervention platform across the globe due to ubiquity of mobile phones and network coverage. MANTRA is a novel mHealth intervention developed to tackle maternal and child health issues through a serious mobile game app in rural Nepal, which demonstrated a statistically significant knowledge improvement in rural women. This paper explores the perceptions and usability of the MANTRA app amongst rural women and Female Community Health Volunteers …

Rural Populationserious gamesInternet privacyPsychological interventionmaternal healthMantraLMICNepalIntervention (counseling)Health careHumansChildmHealthOriginal Researchbusiness.industryPublic Health Environmental and Occupational HealthUsabilityneonatal healthMobile Applicationsknowledge gainChild mortalityeducational gameVideo GamesmHealthCommunity healthVDP::Samfunnsvitenskap: 200FemalePublic HealthBusinessPublic aspects of medicineRA1-1270Delivery of Health CareFrontiers in Public Health
researchProduct

Language-Integrated Privacy-Aware Distributed Queries

2019

Distributed query processing is an effective means for processing large amounts of data. To abstract from the technicalities of distributed systems, algorithms for operator placement automatically distribute sequential data queries over the available processing units. However, current algorithms for operator placement focus on performance and ignore privacy concerns that arise when handling sensitive data. We present a new methodology for privacy-aware operator placement that both prevents leakage of sensitive information and improves performance. Crucially, our approach is based on an information-flow type system for data queries to reason about the sensitivity of query subcomputations. Ou…

SQLInformation privacyScalaComputer scienceDistributed computing020207 software engineering02 engineering and technologyQuery languageInformation sensitivitySoftware deployment020204 information systems0202 electrical engineering electronic engineering information engineeringSequential dataSafety Risk Reliability and QualitycomputerSoftwarecomputer.programming_language
researchProduct

An attribute based access control scheme for secure sharing of electronic health records

2016

Electronic health records (EHRs) play a vital role in modern health industry, allowing the possibility of flexible sharing of health information in the quest of provisioning advanced and efficient healthcare services for the users. Although sharing of EHRs has significant benefits, given that such records contain lot of sensitive information, secure sharing of EHRs is of paramount importance. Thus, there is a need for the realization of sophisticated access control mechanisms for secure sharing of EHRs, which has attracted significant interest from the research community. The most prominent access control schemes for sharing of EHRs found in literature are role based and such solutions have…

Scheme (programming language)business.industryComputer scienceInternet privacy020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genreInformation sensitivityResource (project management)Health care0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYbusinesscomputerSelective disclosurecomputer.programming_languageDrawback2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
researchProduct

Multi-cloud privacy preserving schemes for linear data mining

2015

This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…

Scheme (programming language)privacy linear data miningSIMPLE (military communications protocol)Computer sciencebusiness.industryPrivacy softwareSettore ING-INF/03 - TelecomunicazioniCloud computingcomputer.software_genreSecret sharingComputer Networks and CommunicationFeature (machine learning)Overhead (computing)Data miningElectrical and Electronic EngineeringbusinesscomputerComputer networkcomputer.programming_language
researchProduct