Search results for "Privacy"
showing 10 items of 402 documents
Motivation and Consequences of Internet and Mobile Phone Usage among the Urban Poor in Kampala, Uganda
2015
The Internet and mobile phones are rapidly diffusing throughout communities, and it is important to understand what people are actually doing with their access to these technologies. This study seeks to improve our understanding of the motivational factors and social and economic consequences of such use among the urban poor, which is examined through the Diffusion of Innovations Theory (DoI) and the Capability Approach (CA). The combined theoretical perspective was introduced to explore findings of an explorative case study conducted among the urban poor in Kampala, Uganda, where Internet access was found to be low due to high illiteracy and associated costs. On the other hand, mobile phon…
Is It Possible to Educate, Intervene or “Cure” Autism Spectrum Disorder? A Content Analysis of YouTube Videos
2021
YouTube es uno de los sitios web más conocidos y de mayor acceso en todo el mundo, por lo que tiene un gran potencial pedagógico. No obstante, la calidad y la veracidad de algunos videos de YouTube son cuestionables. Las dudas sobre la confiabilidad del contenido fáctico es un factor controvertido que debe tenerse en cuenta, especialmente cuando se abordan cuestiones de salud pública. Por ello, el principal objetivo de este trabajo es analizar el contenido de los vídeos en español más vistos en YouTube relacionados con el trastorno del espectro autista (TEA). Para la realización de esta investigación se utilizaron los términos "autismo Y educación", "autismo Y intervención" y "autismo Y cur…
Quando la macchina organizza il lavoratore. Spunti su eterodirezione e sistema voice-picking nei contratti di appalto
2022
Nel presente contributo, dopo aver dato atto, per cenni, degli orientamenti giurisprudenziali più recenti in tema di interposizione illecita di manodopera, forniscono alcuni spunti di riflessione in merito al problematico utilizzo, negli appalti ad alta intensità di manodopera nel settore della logistica, del sistema c.d. voice-picking, con cui il personale adibito alle lavorazioni nei magazzini viene guidato da una voce sintetizzata nell’esecuzione della prestazione lavorativa. In this contribution, after acknowledging, for hints, the most recent jurisprudential guidelines on the subject of the illegal interposition of manpower, they provide some food for thought on the problematic use, in…
Capitalismo digitale e controlli sulle attività telematiche dei lavoratori
2022
il saggio analizza il problema dei limiti ai controlli a distanza sulle attività telematiche dei lavoratori, sia nell'ambito del lavoro subordinato, sia nell'ambito delle forme contrattuali emergenti, quali il lavoro agile e il lavoro su piattaforma.
Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime
2020
The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…
Encryption and Generation of Images for Privacy-Preserving Machine Learning in Smart Manufacturing
2023
Current advances in machine (deep) learning and the exponential growth of data collected by and shared between smart manufacturing processes give a unique opportunity to get extra value from that data. The use of public machine learning services actualizes the issue of data privacy. Ordinary encryption protects the data but could make it useless for the machine learning objectives. Therefore, “privacy of data vs. value from data” is the major dilemma within the privacy preserving machine learning activity. Special encryption techniques or synthetic data generation are being in focus to address the issue. In this paper, we discuss a complex hybrid protection algorithm, which assumes sequenti…
ISO/IEC 27001 -standardi yleisen tietosuoja-asetuksen kontekstissa
2017
EU:n tietosuojalainsäädäntö uudistui 24.5.2016, kun yleinen tietosuoja-asetus astui voimaan ja lakia aletaan soveltaa käytännössä kahden vuoden siirtymäajan jälkeen 25.5.2018. Tämä yleinen tietosuoja-asetus on merkittävä uudistus, joka esittelee monia lisäyksiä ja tarkennuksia vanhaan henkilödirektiiviin ja tutkielman kirjoittamisen ajankohtana siirtymäaika on jo käynnissä. Tutkielma toteutettiin kirjallisuuskatsauksena ja tutkielman varsinaisena tarkoituksena oli selvittää, pystyykö tunnettu tietoturvallisuuden hallintajärjestelmä -standardi, ISO/IEC 27001:2013, vastaamaan yleisen tietosuoja-asetuksen moniin vaatimuksiin. Toisin sanoen tarkoituksena oli vertailla standardin ja asetuksen va…
Communication-Efficient Federated Learning in Channel Constrained Internet of Things
2022
Federated learning (FL) is able to utilize the computing capability and maintain the privacy of the end devices by collecting and aggregating the locally trained learning model parameters while keeping the local personal data. As the most widely-used FL framework,Jederated averaging (FedAvg) suffers an expensive communication cost especially when there are large amounts of devices involving the FL process. Moreover, when considering asynchronous FL, the slowest device becomes the bottleneck for the cask effect and determines the overall latency. In this work, we propose a communication-efficient federated learning framework with partial model aggregation (CE-FedPA) algorithm to utilize comp…
Personal name records e tutela della riservatezza nell’Unione europea in Diritti umani e diritto internazionale
2007
PROTEZIONE DEI DATI PERSONALI (DIRITTO CIVILE)
2013
The research analyzes the content of the right to privacy in a comparative perspective in Italian and European Law both in a legislative view than in a jurisprudential level, focusing the most recent developments by Supreme Courts in the considered systems.