Search results for "PRIVACY"
showing 10 items of 402 documents
Science integrity has been never more important: It's all about trust.
2021
“Think. Check. Submit.” to avoid predatory publishing
2018
RISERVATEZZA E PRIVACY: UN'INDAGINE COMPARATISTICA
2012
La ricerca svolta ha consentito di trovare interessanti punti di contatto tra i sistemi di civil law, in particolare quello italiano, sul quale ha giocato un ruolo determinante l’ordinamento europeo, ed i sistemi di common law, in particolare quello americano e inglese. Qualunque tesi si possa condividere sulle origini italiane del diritto alla privacy – elaborazione graduale dell’originario concetto di identità personale o piuttosto trapianto dell’istituto americano del "right to let be alone" – restano da affrontare basilari questioni di "policy" circa la disciplina di un diritto dalla struttura poliedrica e complessa che finora ha trovato più agevolmente riconoscimento formale in una dim…
Mass phone surveillance programs – security vs. civil liberties?
2017
Following September 11 attacks, America has increased its intelligence and defense capabilities. In particular, a historic law named USA Patriot Act was passed by Bush administration together with President’s Surveillance Program. Though the emotional trauma and immediate strategic need to defend the homeland is understandable as it is commendable that the law was passed relatively quick, the Constitution of the United States is what makes this nation so developed and great. This inquiry will take a deep look into the law in relation to unwarranted surveillance over phone activities of the people and assess its constitutionality. To support the assessment, the development of the relevant la…
Mobility and Spatio-Temporal Exposure Control
2013
Modern risk assessment methods cover many issues and encompass both risk analysis and corresponding prevention/mitigation measures.However, there is still room for improvement and one aspect that may benefit from more work is “exposure control”.The “exposure” an asset experiences plays an important part in the risks facing the asset.Amongst the aspects that all too regularly get exposed is user identities and user location information,and in a context with mobile subscriber and mobility in the service hosting (VM migration/mobility) the problems associated with lost identity/location privacy becomes urgent.In this paper we look at “exposure control” as a way for analyzing and protecting use…
The Law of Service Robots
2014
Il settore della robotica attiene alla progettazione e costruzione di un complesso variegato ed eterogeneo di macchine, quali robot, soldati e chirurghi, sistemi automatizzati di trasporto aereo, terrestre e marittimo, applicazioni industriali nell’ambito manifatturiero o nella agricoltura, robotica di servizio e altro ancora. Si tratta di un settore per eccellenza interdisciplinare la varietà di ambiti e applicazioni del quale fa sì che si discuta ancora sulla definizione di robot e su alcune sue proprietà: l’autonomia, l’adattatività o i gradi di interattività. Su queste basi, il problema, attualmente, non è tanto quello di determinare se e in che modo i robot ”agiscano”; la questione ver…
Do Women in Nepal Like Playing a Mobile Game? MANTRA: A Mobile Gamified App for Improving Healthcare Seeking Behavior in Rural Nepal
2021
In Low and Middle Income Countries (LMIC), one of the causes of maternal and child mortality is a lack of medical knowledge and consequently the inability to seek timely healthcare. Mobile health (mHealth) technology is gradually becoming a universal intervention platform across the globe due to ubiquity of mobile phones and network coverage. MANTRA is a novel mHealth intervention developed to tackle maternal and child health issues through a serious mobile game app in rural Nepal, which demonstrated a statistically significant knowledge improvement in rural women. This paper explores the perceptions and usability of the MANTRA app amongst rural women and Female Community Health Volunteers …
Language-Integrated Privacy-Aware Distributed Queries
2019
Distributed query processing is an effective means for processing large amounts of data. To abstract from the technicalities of distributed systems, algorithms for operator placement automatically distribute sequential data queries over the available processing units. However, current algorithms for operator placement focus on performance and ignore privacy concerns that arise when handling sensitive data. We present a new methodology for privacy-aware operator placement that both prevents leakage of sensitive information and improves performance. Crucially, our approach is based on an information-flow type system for data queries to reason about the sensitivity of query subcomputations. Ou…
An attribute based access control scheme for secure sharing of electronic health records
2016
Electronic health records (EHRs) play a vital role in modern health industry, allowing the possibility of flexible sharing of health information in the quest of provisioning advanced and efficient healthcare services for the users. Although sharing of EHRs has significant benefits, given that such records contain lot of sensitive information, secure sharing of EHRs is of paramount importance. Thus, there is a need for the realization of sophisticated access control mechanisms for secure sharing of EHRs, which has attracted significant interest from the research community. The most prominent access control schemes for sharing of EHRs found in literature are role based and such solutions have…
Multi-cloud privacy preserving schemes for linear data mining
2015
This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…