Search results for "Privacy"

showing 10 items of 402 documents

Motivation and Consequences of Internet and Mobile Phone Usage among the Urban Poor in Kampala, Uganda

2015

The Internet and mobile phones are rapidly diffusing throughout communities, and it is important to understand what people are actually doing with their access to these technologies. This study seeks to improve our understanding of the motivational factors and social and economic consequences of such use among the urban poor, which is examined through the Diffusion of Innovations Theory (DoI) and the Capability Approach (CA). The combined theoretical perspective was introduced to explore findings of an explorative case study conducted among the urban poor in Kampala, Uganda, where Internet access was found to be low due to high illiteracy and associated costs. On the other hand, mobile phon…

business.product_categorybusiness.industryInternet privacyAdvertisingUrban poorHandsetlaw.inventionlawMobile phoneInternet accessCapability approachThe InternetBusinessFunctional illiteracyEconomic consequences2015 48th Hawaii International Conference on System Sciences
researchProduct

Is It Possible to Educate, Intervene or “Cure” Autism Spectrum Disorder? A Content Analysis of YouTube Videos

2021

YouTube es uno de los sitios web más conocidos y de mayor acceso en todo el mundo, por lo que tiene un gran potencial pedagógico. No obstante, la calidad y la veracidad de algunos videos de YouTube son cuestionables. Las dudas sobre la confiabilidad del contenido fáctico es un factor controvertido que debe tenerse en cuenta, especialmente cuando se abordan cuestiones de salud pública. Por ello, el principal objetivo de este trabajo es analizar el contenido de los vídeos en español más vistos en YouTube relacionados con el trastorno del espectro autista (TEA). Para la realización de esta investigación se utilizaron los términos "autismo Y educación", "autismo Y intervención" y "autismo Y cur…

content analysisHealth Toxicology and Mutagenesismedia_common.quotation_subjectsocial mediaInternet privacyVideo Recordinglcsh:Medicineautism spectrum disorderArticle03 medical and health sciences0302 clinical medicineIntervention (counseling)medicineHumans0501 psychology and cognitive sciencesSocial mediaQuality (business)030212 general & internal medicineinterventionmedia_commonbusiness.industryYouTube05 social scienceslcsh:RPublic Health Environmental and Occupational HealthVideotape Recordingmedicine.diseaseAutism spectrum disorderContent analysisAutismThe InternetPublic HealthinternetAutismePsychologybusiness050104 developmental & child psychologyPatient educationInternational Journal of Environmental Research and Public Health
researchProduct

Quando la macchina organizza il lavoratore. Spunti su eterodirezione e sistema voice-picking nei contratti di appalto

2022

Nel presente contributo, dopo aver dato atto, per cenni, degli orientamenti giurisprudenziali più recenti in tema di interposizione illecita di manodopera, forniscono alcuni spunti di riflessione in merito al problematico utilizzo, negli appalti ad alta intensità di manodopera nel settore della logistica, del sistema c.d. voice-picking, con cui il personale adibito alle lavorazioni nei magazzini viene guidato da una voce sintetizzata nell’esecuzione della prestazione lavorativa. In this contribution, after acknowledging, for hints, the most recent jurisprudential guidelines on the subject of the illegal interposition of manpower, they provide some food for thought on the problematic use, in…

contracts privacy procurement logistics voice-picking systemSettore IUS/01 - Diritto Privato
researchProduct

Capitalismo digitale e controlli sulle attività telematiche dei lavoratori

2022

il saggio analizza il problema dei limiti ai controlli a distanza sulle attività telematiche dei lavoratori, sia nell'ambito del lavoro subordinato, sia nell'ambito delle forme contrattuali emergenti, quali il lavoro agile e il lavoro su piattaforma.

controlli attività telematiche statuto lavoratori art. 4 privacy dati personaliSettore IUS/07 - Diritto Del Lavoro
researchProduct

Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime

2020

The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…

cybersecurityfrustration050801 communication & media studies02 engineering and technologyprivacy concernsComputer securitycomputer.software_genre0508 media and communications020204 information systemsyksityisyys0202 electrical engineering electronic engineering information engineeringkyberturvallisuusonline expressionriskitverkkopalvelutInternetkyberrikollisuustime consumption05 social sciencesitseilmaisukuluttajakäyttäytyminenCybercrimerisk avoidanceExpression (architecture)cybercrimePsychologycomputerpersonal cybersecurity spending
researchProduct

Encryption and Generation of Images for Privacy-Preserving Machine Learning in Smart Manufacturing

2023

Current advances in machine (deep) learning and the exponential growth of data collected by and shared between smart manufacturing processes give a unique opportunity to get extra value from that data. The use of public machine learning services actualizes the issue of data privacy. Ordinary encryption protects the data but could make it useless for the machine learning objectives. Therefore, “privacy of data vs. value from data” is the major dilemma within the privacy preserving machine learning activity. Special encryption techniques or synthetic data generation are being in focus to address the issue. In this paper, we discuss a complex hybrid protection algorithm, which assumes sequenti…

data privacyIndustry 4.0anonymizationimage processingtietosuojakoneoppiminensalausautoencoderssyntetic data generationGeneral Earth and Planetary SciencesvalmistustekniikkakonenäköteollisuusanonymiteettiGeneral Environmental ScienceProcedia Computer Science
researchProduct

ISO/IEC 27001 -standardi yleisen tietosuoja-asetuksen kontekstissa

2017

EU:n tietosuojalainsäädäntö uudistui 24.5.2016, kun yleinen tietosuoja-asetus astui voimaan ja lakia aletaan soveltaa käytännössä kahden vuoden siirtymäajan jälkeen 25.5.2018. Tämä yleinen tietosuoja-asetus on merkittävä uudistus, joka esittelee monia lisäyksiä ja tarkennuksia vanhaan henkilödirektiiviin ja tutkielman kirjoittamisen ajankohtana siirtymäaika on jo käynnissä. Tutkielma toteutettiin kirjallisuuskatsauksena ja tutkielman varsinaisena tarkoituksena oli selvittää, pystyykö tunnettu tietoturvallisuuden hallintajärjestelmä -standardi, ISO/IEC 27001:2013, vastaamaan yleisen tietosuoja-asetuksen moniin vaatimuksiin. Toisin sanoen tarkoituksena oli vertailla standardin ja asetuksen va…

data privacytietosuojalainsäädäntöpersonal datahenkilötietolakistandardsstandardittietoturvaEU-legislation
researchProduct

Communication-Efficient Federated Learning in Channel Constrained Internet of Things

2022

Federated learning (FL) is able to utilize the computing capability and maintain the privacy of the end devices by collecting and aggregating the locally trained learning model parameters while keeping the local personal data. As the most widely-used FL framework,Jederated averaging (FedAvg) suffers an expensive communication cost especially when there are large amounts of devices involving the FL process. Moreover, when considering asynchronous FL, the slowest device becomes the bottleneck for the cask effect and determines the overall latency. In this work, we propose a communication-efficient federated learning framework with partial model aggregation (CE-FedPA) algorithm to utilize comp…

data privacytietosuojatrainingkoneoppiminenfederated learningcostssimulointiesineiden internetsimulationtiedonsiirtoperformance evaluationdata integrity
researchProduct

Personal name records e tutela della riservatezza nell’Unione europea in Diritti umani e diritto internazionale

2007

dati personali privacy flussi transfrontalieri di dati
researchProduct

PROTEZIONE DEI DATI PERSONALI (DIRITTO CIVILE)

2013

The research analyzes the content of the right to privacy in a comparative perspective in Italian and European Law both in a legislative view than in a jurisprudential level, focusing the most recent developments by Supreme Courts in the considered systems.

dati personaliSettore IUS/02 - Diritto Privato Comparatoprivacy
researchProduct