WorldWideScience

Sample records for model privacy form

  1. 16 CFR 313.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  2. 12 CFR 716.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  3. 12 CFR 573.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Model privacy form and examples. 573.2 Section... FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model... privacy form is not required. (b) Examples. The examples in this part are not exclusive. Compliance with...

  4. 12 CFR 332.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model... this part, although use of the model privacy form is not required. (b) Examples. The examples in this...

  5. 17 CFR 160.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-04-01

    ... examples. 160.2 Section 160.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  6. 12 CFR 216.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a... of this part, although use of the model privacy form is not required. (b) Examples. The examples in...

  7. 12 CFR 40.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER... privacy form in Appendix A of this part, consistent with the instructions in Appendix A, constitutes compliance with the notice content requirements of §§ 40.6 and 40.7 of this part, although use of the model...

  8. 12 CFR Appendix A to Part 40 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... use my personal information to market to me.” (4) Nonaffiliate opt-out. If the financial institution... [name of financial institution ] collect my personal information?” Institutions must use five (5) of the... institution, including a group of financial institutions that use a common privacy notice, to meet the content...

  9. 12 CFR Appendix A to Part 573 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... affiliates, state, as applicable: “Our affiliates include companies with a [common corporate identity of... corporate logo on any page of the notice, so long as it does not interfere with the readability of the model... identity of affiliated institutions jointly providing the notice on the form wherever [name of financial...

  10. 12 CFR Appendix A to Part 716 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... affiliates, state, as applicable: “Our affiliates include companies with a [common corporate identity of... corporate logo on any page of the notice, so long as it does not interfere with the readability of the model... identity of affiliated institutions jointly providing the notice on the form wherever [name of financial...

  11. 17 CFR Appendix A to Part 160 - Model Privacy Form

    Science.gov (United States)

    2010-04-01

    ... include companies with a [common corporate identity of financial institution] name; financial companies... institution may include a corporate logo on any page of the notice, so long as it does not interfere with the... notice or a common identity of affiliated institutions jointly providing the notice on the form wherever...

  12. Untangling RFID Privacy Models

    Directory of Open Access Journals (Sweden)

    Iwen Coisel

    2013-01-01

    Full Text Available The rise of wireless applications based on RFID has brought up major concerns on privacy. Indeed nowadays, when such an application is deployed, informed customers yearn for guarantees that their privacy will not be threatened. One formal way to perform this task is to assess the privacy level of the RFID application with a model. However, if the chosen model does not reflect the assumptions and requirements of the analyzed application, it may misevaluate its privacy level. Therefore, selecting the most appropriate model among all the existing ones is not an easy task. This paper investigates the eight most well-known RFID privacy models and thoroughly examines their advantages and drawbacks in three steps. Firstly, five RFID authentication protocols are analyzed with these models. This discloses a main worry: although these protocols intuitively ensure different privacy levels, no model is able to accurately distinguish them. Secondly, these models are grouped according to their features (e.g., tag corruption ability. This classification reveals the most appropriate candidate model(s to be used for a privacy analysis when one of these features is especially required. Furthermore, it points out that none of the models are comprehensive. Hence, some combinations of features may not match any model. Finally, the privacy properties of the eight models are compared in order to provide an overall view of their relations. This part highlights that no model globally outclasses the other ones. Considering the required properties of an application, the thorough study provided in this paper aims to assist system designers to choose the best suited model.

  13. MODEL REGULATION FOR DATA PRIVACY IN THE APPLICATION OF BIOMETRIC SMART CARD

    Directory of Open Access Journals (Sweden)

    Sinta Dewi

    2017-03-01

    This article will explore data privacy model regulation which is intended to regulate and protect  data privacy. This  regulatory model  combining several approaches in managing data privacy, especially in using biometric smardcard. Firstly, through laws that enforces the principles and international standards. Secondly, through the market approach (market-based solution which is derived through industry associations to help protect consumer data privacy by applying privacy policy in the form of a statement that the industry will protect consumers' privacy by implementing fair information principles. Third, through technological approach such as PET's (privacy enchasing technology,  i.e the techniques for anonymous and pseudo-anonymous payment, communication, and web access. Fourthly, through corporate privacy rules.

  14. Privacy context model for dynamic privacy adaptation in ubiquitous computing

    NARCIS (Netherlands)

    Schaub, Florian; Koenings, Bastian; Dietzel, Stefan; Weber, M.; Kargl, Frank

    Ubiquitous computing is characterized by the merger of physical and virtual worlds as physical artifacts gain digital sensing, processing, and communication capabilities. Maintaining an appropriate level of privacy in the face of such complex and often highly dynamic systems is challenging. We argue

  15. A Privacy Model for RFID Tag Ownership Transfer

    Directory of Open Access Journals (Sweden)

    Xingchun Yang

    2017-01-01

    Full Text Available The ownership of RFID tag is often transferred from one owner to another in its life cycle. To address the privacy problem caused by tag ownership transfer, we propose a tag privacy model which captures the adversary’s abilities to get secret information inside readers, to corrupt tags, to authenticate tags, and to observe tag ownership transfer processes. This model gives formal definitions for tag forward privacy and backward privacy and can be used to measure the privacy property of tag ownership transfer scheme. We also present a tag ownership transfer scheme, which is privacy-preserving under the proposed model and satisfies the other common security requirements, in addition to achieving better performance.

  16. Modelling information dissemination under privacy concerns in social media

    Science.gov (United States)

    Zhu, Hui; Huang, Cheng; Lu, Rongxing; Li, Hui

    2016-05-01

    Social media has recently become an important platform for users to share news, express views, and post messages. However, due to user privacy preservation in social media, many privacy setting tools are employed, which inevitably change the patterns and dynamics of information dissemination. In this study, a general stochastic model using dynamic evolution equations was introduced to illustrate how privacy concerns impact the process of information dissemination. Extensive simulations and analyzes involving the privacy settings of general users, privileged users, and pure observers were conducted on real-world networks, and the results demonstrated that user privacy settings affect information differently. Finally, we also studied the process of information diffusion analytically and numerically with different privacy settings using two classic networks.

  17. Review of the model of technological pragmatism considering privacy and security

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina M.

    2013-01-01

    Full Text Available The model of technological pragmatism assumes awareness that technological development involves both benefits and dangers. Most modern security technologies represent citizens' mass surveillance tools, which can lead to compromising a significant amount of personal data due to the lack of institutional monitoring and control. On the other hand, people are interested in improving crime control and reducing the fear of potential victimization which this framework provides as a rational justification for the apparent loss of privacy, personal rights and freedoms. Citizens' perception on the categories of security and privacy, and their balancing, can provide the necessary guidelines to regulate the application of security technologies in the actual context. The aim of this paper is to analyze the attitudes of students at the University of Belgrade (N = 269 toward the application of security technology and identification of the key dimensions. On the basis of the relevant research the authors have formed assumptions about the following dimensions: security, privacy, trust in institutions and concern about the misuse of security technology. The Prise Questionnaire on Security Technology and Privacy was used for data collection. Factor analysis abstracted eight factors which together account for 58% of variance, with the highest loading of the four factors that are identified as security, privacy, trust and concern. The authors propose a model of technological pragmatism considering security and privacy. The data also showed that students are willing to change their privacy for the purpose of improving security and vice versa.

  18. A Framework For Enhancing Privacy In Location Based Services Using K-Anonymity Model

    Directory of Open Access Journals (Sweden)

    Jane Mugi

    2015-08-01

    Full Text Available Abstract This paper presents a framework for enhancing privacy in Location Based Services using K-anonymity model. Users of location based services have to reveal their location information in order to use these services however this has threatened the user privacy. K-anonymity approach has been studied extensively in various forms. However it is only effective when the user location is fixed. When a user moves and continuously sends their location information the location service provider can approximate user trajectory which poses a threat to the trajectory privacy of the user. This framework will ensure that user privacy is enhanced for both snapshot and continuous queries. The efficiency and effectiveness of the proposed framework was evaluated the results indicate that the proposed framework has high success rate and good run time performance.

  19. Privacy concerns and online purchasing behaviour: Towards an integrated model

    Directory of Open Access Journals (Sweden)

    Nuno Fortes

    2016-09-01

    Full Text Available This study aims to analyze how privacy concerns about the Internet have an impact on the consumer's intention to make online purchases. A research model was developed establishing that this impact takes place via the connection of privacy concerns with the theories of trust and risk, the theory of planned behaviour and the technology acceptance model. The empirical study was based on an online survey that collected data from 900 individuals. The results confirmed the acceptance of all proposed hypotheses and the overall validation of the research model. Implications and further research suggestions are presented.

  20. Model-driven Privacy Assessment in the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Knirsch, Fabian [Salzburg Univ. (Austria); Engel, Dominik [Salzburg Univ. (Austria); Neureiter, Christian [Salzburg Univ. (Austria); Frincu, Marc [Univ. of Southern California, Los Angeles, CA (United States); Prasanna, Viktor [Univ. of Southern California, Los Angeles, CA (United States)

    2015-02-09

    In a smart grid, data and information are transported, transmitted, stored, and processed with various stakeholders having to cooperate effectively. Furthermore, personal data is the key to many smart grid applications and therefore privacy impacts have to be taken into account. For an effective smart grid, well integrated solutions are crucial and for achieving a high degree of customer acceptance, privacy should already be considered at design time of the system. To assist system engineers in early design phase, frameworks for the automated privacy evaluation of use cases are important. For evaluation, use cases for services and software architectures need to be formally captured in a standardized and commonly understood manner. In order to ensure this common understanding for all kinds of stakeholders, reference models have recently been developed. In this paper we present a model-driven approach for the automated assessment of such services and software architectures in the smart grid that builds on the standardized reference models. The focus of qualitative and quantitative evaluation is on privacy. For evaluation, the framework draws on use cases from the University of Southern California microgrid.

  1. Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing

    OpenAIRE

    Xiaoxun Sun; Hua Wang; Jiuyong Li; Traian Marius Truta

    2008-01-01

    Publishing data for analysis from a micro data table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-anonymity model was proposed for privacy preserving data publication. While focusing on identity disclosure, k-anonymity model fails to protect attribute disclosure to some extent. Many efforts are made to enhance the k-anonymity model recently. In this paper, we propose two new privacy protection models called (p, a)-...

  2. 77 FR 60129 - 60-Day Proposed Information Collection: Indian Health Service Forms To Implement the Privacy Rule...

    Science.gov (United States)

    2012-10-02

    .... Yvette Roubideaux, Director, Indian Health Service. [FR Doc. 2012-24119 Filed 10-1-12; 8:45 am] BILLING... DEPARTMENT OF HEALTH AND HUMAN SERVICES Indian Health Service 60-Day Proposed Information Collection: Indian Health Service Forms To Implement the Privacy Rule; Request for Public Comment AGENCY...

  3. Privacy Respecting Targeted Advertising for Social Networks

    OpenAIRE

    Kahl , Christian; Crane , Stephen; Tschersich , Markus; Rannenberg , Kai

    2011-01-01

    Part 10: Mobile Application Security and Privacy (Short Papers); International audience; Online Social Networks form an increasingly important part of people’s lives. As mobile technologies improve accessibility, concerns about privacy and trust are more apparent as advertising becomes a critical component of most social network’s economic model. In this paper we describe the PICOS project’s research into privacy preserving advertising options for social networks. We introduce an architecture...

  4. The Models of Applying Online Privacy Literacy Strategies: A Case Study of Instagram Girl Users

    Directory of Open Access Journals (Sweden)

    Abdollah Bicharanlou

    2017-09-01

    Full Text Available Social networks affect remarkably in the lives of virtual space users. These networks like most human relations involve compromising between self-disclosure and privacy protection. A process which is realized through improving privacy and empowering the user at the personal level. This study aimed to assess strategies based on online privacy literacy. In particular, strategies that Instagram young girls users should employ to achieve the optimum level of privacy. For this purpose, firstly the paradox of privacy, benefits and risks of self-disclosure are explained, then according to online privacy literacy, some social and technological strategies are introduced by which users can solve the “paradox of privacy.” In the result section, after describing the main benefits and risks of self-disclosure by girl users, the current models of using these social and technological strategies to solve the mentioned paradox are discussed. The research method is ethnography based on non-collaborative observation of Instagram pages and semi-structured interviews with 20 girl users of social networks.

  5. A Privacy Preservation Model for Health-Related Social Networking Sites

    Science.gov (United States)

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  6. A Privacy Preservation Model for Health-Related Social Networking Sites.

    Science.gov (United States)

    Li, Jingquan

    2015-07-08

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS.

  7. A standardised graphic method for describing data privacy frameworks in primary care research using a flexible zone model.

    Science.gov (United States)

    Kuchinke, Wolfgang; Ohmann, Christian; Verheij, Robert A; van Veen, Evert-Ben; Arvanitis, Theodoros N; Taweel, Adel; Delaney, Brendan C

    2014-12-01

    To develop a model describing core concepts and principles of data flow, data privacy and confidentiality, in a simple and flexible way, using concise process descriptions and a diagrammatic notation applied to research workflow processes. The model should help to generate robust data privacy frameworks for research done with patient data. Based on an exploration of EU legal requirements for data protection and privacy, data access policies, and existing privacy frameworks of research projects, basic concepts and common processes were extracted, described and incorporated into a model with a formal graphical representation and a standardised notation. The Unified Modelling Language (UML) notation was enriched by workflow and own symbols to enable the representation of extended data flow requirements, data privacy and data security requirements, privacy enhancing techniques (PET) and to allow privacy threat analysis for research scenarios. Our model is built upon the concept of three privacy zones (Care Zone, Non-care Zone and Research Zone) containing databases, data transformation operators, such as data linkers and privacy filters. Using these model components, a risk gradient for moving data from a zone of high risk for patient identification to a zone of low risk can be described. The model was applied to the analysis of data flows in several general clinical research use cases and two research scenarios from the TRANSFoRm project (e.g., finding patients for clinical research and linkage of databases). The model was validated by representing research done with the NIVEL Primary Care Database in the Netherlands. The model allows analysis of data privacy and confidentiality issues for research with patient data in a structured way and provides a framework to specify a privacy compliant data flow, to communicate privacy requirements and to identify weak points for an adequate implementation of data privacy. Copyright © 2014 Elsevier Ireland Ltd. All rights

  8. Determining the privacy policy deficiencies of health ICT applications through semi-formal modelling.

    Science.gov (United States)

    Croll, Peter R

    2011-02-01

    To ensure that patient confidentiality is securely maintained, health ICT applications that contain sensitive personal information demand comprehensive privacy policies. Determining the adequacy of these policies to meet legal conformity together with clinical users and patient expectation is demanding in practice. Organisations and agencies looking to analyse their Privacy and Security policies can benefit from guidance provided by outside entities such as the Privacy Office of their State or Government together with law firms and ICT specialists. The advice given is not uniform and often open to different interpretations. Of greater concern is the possibility of overlooking any important aspects that later result in a data breach. Based on three case studies, this paper considers whether a more formal approach to privacy analysis could be taken that would help identify the full coverage of a Privacy Impact Analysis and determine the deficiencies with an organisation's current policies and approach. A diagrammatic model showing the relationships between Confidentiality, Privacy, Trust, Security and Safety is introduced. First the validity of this model is determined by mapping it against the real-world case studies taken from three healthcare services that depend on ICT. Then, by using software engineering methods, a formal mapping of the relationships is undertaken to identify a full set of policies needed to satisfy the model. How effective this approach may prove as a generic method for deriving a comprehensive set of policies in health ICT applications is finally discussed. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  9. A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network

    Directory of Open Access Journals (Sweden)

    Jundong Chen

    2014-05-01

    Full Text Available Users of online social networks often adjust their privacy settings to control how much information on their profiles is accessible to other users of the networks. While a variety of factors have been shown to affect the privacy strategies of these users, very little work has been done in analyzing how these factors influence each other and collectively contribute towards the users’ privacy strategies. In this paper, we analyze the influence of attribute importance, benefit, risk and network topology on the users’ attribute disclosure behavior by introducing a weighted evolutionary game model. Results show that: irrespective of risk, users aremore likely to reveal theirmost important attributes than their least important attributes; when the users’ range of influence is increased, the risk factor plays a smaller role in attribute disclosure; the network topology exhibits a considerable effect on the privacy in an environment with risk.

  10. 12 CFR Appendix A to Part 216 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... include companies with a [common corporate identity of financial institution] name; financial companies... lines of type. (b) Logo. A financial institution may include a corporate logo on any page of the notice... name of the financial institution providing the notice or a common identity of affiliated institutions...

  11. 16 CFR Appendix A to Part 313 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... include companies with a [common corporate identity of financial institution] name; financial companies... spacing between the lines of type. (b) Logo. A financial institution may include a corporate logo on any... the Notice Insert the name of the financial institution providing the notice or a common identity of...

  12. 12 CFR Appendix A to Part 332 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... include companies with a [common corporate identity of financial institution] name; financial companies... lines of type. (b) Logo. A financial institution may include a corporate logo on any page of the notice... name of the financial institution providing the notice or a common identity of affiliated institutions...

  13. A Randomized Response Model For Privacy Preserving Smart Metering

    Science.gov (United States)

    Cui, Lijuan; Que, Jialan; Choi, Dae-Hyun; Jiang, Xiaoqian; Cheng, Samuel; Xie, Le

    2012-01-01

    The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading with a pre-determinted probability. Load serving entities (LSE) can reconstruct the total electricity consumption of a region or a district through inference algorithm, but their ability of identifying individual users’ energy consumption pattern is significantly reduced. Using simulated data, we verify the feasibility of the proposed method and demonstrate performance advantages over existing approaches. PMID:23243488

  14. Development and Analyses of Privacy Management Models in Online Social Networks Based on Communication Privacy Management Theory

    Science.gov (United States)

    Lee, Ki Jung

    2013-01-01

    Online social networks (OSNs), while serving as an emerging means of communication, promote various issues of privacy. Users of OSNs encounter diverse occasions that lead to invasion of their privacy, e.g., published conversation, public revelation of their personally identifiable information, and open boundary of distinct social groups within…

  15. Role-task conditional-purpose policy model for privacy preserving data publishing

    Directory of Open Access Journals (Sweden)

    Rana Elgendy

    2017-12-01

    Full Text Available Privacy becomes a major concern for both consumers and enterprises; therefore many research efforts have been devoted to the development of privacy preserving technology. The challenge in data privacy is to share the data while assuring the protection of personal information. Data privacy includes assuring protection for both insider ad outsider threats even if the data is published. Access control can help to protect the data from outsider threats. Access control is defined as the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. This can be enforced by a mechanism implementing regulations established by a security policy. In this paper, we present privacy preserving data publishing model based on integration of CPBAC, MD-TRBAC, PBFW, protection against database administrator technique inspired from oracle vault technique and benefits of anonymization technique to protect data when being published using k-anonymity. The proposed model meets the requirements of workflow and non-workflow system in enterprise environment. It is based on the characteristics of the conditional purposes, conditional roles, tasks, and policies. It guarantees the protection against insider threats such as database administrator. Finally it assures needed protection in case of publishing the data. Keywords: Database security, Access control, Data publishing, Anonymization

  16. Model-based Assessment for Balancing Privacy Requirements and Operational Capabilities

    Energy Technology Data Exchange (ETDEWEB)

    Knirsch, Fabian [Salzburg Univ. (Austria); Engel, Dominik [Salzburg Univ. (Austria); Frincu, Marc [Univ. of Southern California, Los Angeles, CA (United States); Prasanna, Viktor [Univ. of Southern California, Los Angeles, CA (United States)

    2015-02-17

    The smart grid changes the way energy is produced and distributed. In addition both, energy and information is exchanged bidirectionally among participating parties. Therefore heterogeneous systems have to cooperate effectively in order to achieve a common high-level use case, such as smart metering for billing or demand response for load curtailment. Furthermore, a substantial amount of personal data is often needed for achieving that goal. Capturing and processing personal data in the smart grid increases customer concerns about privacy and in addition, certain statutory and operational requirements regarding privacy aware data processing and storage have to be met. An increase of privacy constraints, however, often limits the operational capabilities of the system. In this paper, we present an approach that automates the process of finding an optimal balance between privacy requirements and operational requirements in a smart grid use case and application scenario. This is achieved by formally describing use cases in an abstract model and by finding an algorithm that determines the optimum balance by forward mapping privacy and operational impacts. For this optimal balancing algorithm both, a numeric approximation and – if feasible – an analytic assessment are presented and investigated. The system is evaluated by applying the tool to a real-world use case from the University of Southern California (USC) microgrid.

  17. Privacy versus autonomy: a tradeoff model for smart home monitoring technologies.

    Science.gov (United States)

    Townsend, Daphne; Knoefel, Frank; Goubran, Rafik

    2011-01-01

    Smart homes are proposed as a new location for the delivery of healthcare services. They provide healthcare monitoring and communication services, by using integrated sensor network technologies. We validate a hypothesis regarding older adults' adoption of home monitoring technologies by conducting a literature review of articles studying older adults' attitudes and perceptions of sensor technologies. Using current literature to support the hypothesis, this paper applies the tradeoff model to decisions about sensor acceptance. Older adults are willing to trade privacy (by accepting a monitoring technology), for autonomy. As the information captured by the sensor becomes more intrusive and the infringement on privacy increases, sensors are accepted if the loss in privacy is traded for autonomy. Even video cameras, the most intrusive sensor type were accepted in exchange for the height of autonomy which is to remain in the home.

  18. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby......This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... encouraging further institutional collaboration and acceptance of citizens’ informational self-determination....

  19. Building a Privacy Model in the Business Processes of the Enterprise: An Information Systems Design Science Research

    Directory of Open Access Journals (Sweden)

    Munir Majdalawieh

    2013-08-01

    Full Text Available Privacy has not been researched or investigated from business process management perspective and the current literature has shown lack of a well-defined methodology for integrating privacy into business processes. This paper proposes an integrated privacy model. Such model is an integral part of the organization’s enterprise to ensure that personal data protection is impeded in the business processes of any system that is involved in collecting, disseminating, and accessing an individual’s data. Passing privacy laws is very essential and requires some cooperation and partnership between nations based on some privacy principles. The proposed framework is built on these principles and will help organizations to develop data protection in their business processes, assess the privacy issues in their organization, protect the interest of their clients, advance their value proposition, and make it easier to identify the impact of privacy on their business. The study follows the design science research process and the information systems design science research (ISDSR methodologies by identifying relevant problems from the current literature, defining the objectives of the study, designing and developing the ABC-PDMS model, and evaluating the model.

  20. A Knowledge-Constrained Access Control Model for Protecting Patient Privacy in Hospital Information Systems.

    Science.gov (United States)

    Zhang, Runtong; Chen, Donghua; Shang, Xiaopu; Zhu, Xiaomin; Liu, Kecheng

    2017-04-24

    Current access control mechanisms of the hospital information system can hardly identify the real access intention of system users. A relaxed access control increases the risk of compromise of patient privacy. To reduce unnecessary access of patient information by hospital staff, this paper proposes a Knowledge-Constrained Role-Based Access Control (KC-RBAC) model in which a variety of medical domain knowledge is considered in access control. Based on the proposed Purpose Tree and knowledge-involved algorithms, the model can dynamically define the boundary of access to the patient information according to the context, which helps protect patient privacy by controlling access. Compared with the Role-Based Access Control model, KC-RBAC can effectively protect patient information according to the results of the experiments.

  1. Privacy protection on the internet: The European model

    Directory of Open Access Journals (Sweden)

    Baltezarević Vesna

    2017-01-01

    Full Text Available The Internet has a huge impact on all areas of social activity. Everyday life, social interaction and economics are directed to new information and communication technologies. A positive aspect of the new technology is reflected in the fact that it has created a virtual space that has led to the elimination of the various barriers, which has enabled interaction and information exchange across the world. Inclusion in the virtual social network provides connectivity for communicators who are looking for space that allows them freedom of expression and connect them with new ' friends'. Because of the feeling of complete freedom and the absence of censorship on the network communicators leave many personal details and photos, without thinking about the possible abuses of privacy. Recording of the different incidents on the network has resulted in the need to take precaution measures, in order to protect the users and the rule of law, given that freedom on the network is only possible with the existence of an adequate system of safety and security. In this paper we deal with the problem of the protection of personal data of users of virtual social networks against malicious activity and abuse, with special reference to the activities of the European Union in an effort to regulate this area. The European Commission has concentrated on finding the best solutions to protect the user's virtual space for more than two decades, starting from 1995 until a directive on security of networks and information systems, which was adopted in the first half of 2016.

  2. Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking

    OpenAIRE

    Panaousis, Emmanouil; Laszka, Aron; Pohl, Johannes; Noack, Andreas; Alpcan, Tansu

    2016-01-01

    Nowadays, mobile users have a vast number of applications and services at their disposal. Each of these might impose some privacy threats on users' "Personally Identifiable Information" (PII). Location privacy is a crucial part of PII, and as such, privacy-aware users wish to maximize it. This privacy can be, for instance, threatened by a company, which collects users' traces and shares them with third parties. To maximize their location privacy, users can decide to get offline so that the co...

  3. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  4. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching

    Directory of Open Access Journals (Sweden)

    Simon Fong

    2012-01-01

    Full Text Available Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user’s activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user’s medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user’s privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  5. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  6. The Models of Applying Online Privacy Literacy Strategies: A Case Study of Instagram Girl Users

    OpenAIRE

    Abdollah Bicharanlou; Seyedeh farzaneh Siasi rad

    2017-01-01

    Social networks affect remarkably in the lives of virtual space users. These networks like most human relations involve compromising between self-disclosure and privacy protection. A process which is realized through improving privacy and empowering the user at the personal level. This study aimed to assess strategies based on online privacy literacy. In particular, strategies that Instagram young girls users should employ to achieve the optimum level of privacy. For this purpose, firstly the...

  7. Privacy Policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy; Petkovic, M.; Jonker, W.; Jonker, Willem

    2007-01-01

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  8. Constitutive modelling for composite forming

    NARCIS (Netherlands)

    Akkerman, Remko; Lamers, E.A.D.; Long, A.C.

    2007-01-01

    Fibre reorientation occurs when forming a reinforced structure such as a fabric onto a doubly curved surface. This leads to a change in the angle between warp and fill yarns. The composite properties change inhomogeneously, corresponding to the varying angle between warp and fill yarns. Many

  9. A standardised graphic method for describing data privacy frameworks in primary care research using a flexible zone model.

    NARCIS (Netherlands)

    Kuchinke, W.; Ohmann, C.; Verheij, R.A.; Veen, E.B. van; Arvanitis, T.N.; Taweel, A.; Delaney, B.C.

    2014-01-01

    Purpose: To develop a model describing core concepts and principles of data flow, data privacy and confidentiality, in a simple and flexible way, using concise process descriptions and a diagrammatic notation applied to research workflow processes. The model should help to generate robust data

  10. Data Availability and Model Form

    NARCIS (Netherlands)

    Tavasszy, L.A.; Jong, G. de

    2013-01-01

    Data are essential for any empirical modelling effort. In freight transport, obtaining good data for modelling can be a challenge because of the difficulty to observe freight processes directly, the often proprietary nature of logistics data, and a relatively poor data acquisition infrastructure. In

  11. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  12. COINSTAC: A privacy enabled model and prototype for leveraging and processing decentralized brain imaging data

    Directory of Open Access Journals (Sweden)

    Sergey M Plis

    2016-08-01

    Full Text Available The field of neuroimaging has embraced the need for sharing and collaboration. Data sharing mandates from public funding agencies and major journal publishers have spurred the development of data repositories and neuroinformatics consortia. However, efficient and effective data sharing still faces several hurdles. For example, open data sharing is on the rise but is not suitable for sensitive data that are not easily shared, such as genetics. Current approaches can be cumbersome (such as negotiating multiple data sharing agreements. There are also significant data transfer, organization and computational challenges. Centralized repositories only partially address the issues. We propose a dynamic, decentralized platform for large scale analyses called the Collaborative Informatics and Neuroimaging Suite Toolkit for Anonymous Computation (COINSTAC. The COINSTAC solution can include data missing from central repositories, allows pooling of both open and ``closed'' repositories by developing privacy-preserving versions of widely-used algorithms, and incorporates the tools within an easy-to-use platform enabling distributed computation. We present an initial prototype system which we demonstrate on two multi-site data sets, without aggregating the data. In addition, by iterating across sites, the COINSTAC model enables meta-analytic solutions to converge to ``pooled-data'' solutions (i.e. as if the entire data were in hand. More advanced approaches such as feature generation, matrix factorization models, and preprocessing can be incorporated into such a model. In sum, COINSTAC enables access to the many currently unavailable data sets, a user friendly privacy enabled interface for decentralized analysis, and a powerful solution that complements existing data sharing solutions.

  13. 'Privacy lost - and found?' : the information value chain as a model to meet citizens' concerns

    NARCIS (Netherlands)

    van de Pas, John; van Bussel, Geert-Jan

    2015-01-01

    In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effective in providing privacy to citizens. Rapid development of ubiquitous computing and ‘the internet of things’ are leading to Big Data and the application of Predictive Analytics, effectively merging the

  14. Opening More Data : A New Privacy Risk Scoring Model for Open Data

    NARCIS (Netherlands)

    Ali-Eldin, A.M.T.; Zuiderwijk-van Eijk, AMG; Janssen, M.F.W.H.A.

    2017-01-01

    While the opening of data has become a common practice for both governments and companies, many datasets
    are still not published since they might violate privacy regulations. The risk on privacy violations is a factor
    that often blocks the publication of data and results in a reserved

  15. Privacy is a process, not a PET: a theory for effective privacy practice

    OpenAIRE

    Morton, A.; Sasse, M. A.

    2012-01-01

    Privacy research has not helped practitioners -- who struggle to reconcile users' demands for information privacy with information security, legislation, information management and use -- to improve privacy practice. Beginning with the principle that information security is necessary but not sufficient for privacy, we present an innovative layered framework - the Privacy Security Trust (PST) Framework - which integrates, in one model, the different activities practitioners must undertake for ...

  16. A Heuristic Model for Supporting Users’ Decision-Making in Privacy Disclosure for Recommendation

    Directory of Open Access Journals (Sweden)

    Hongchen Wu

    2018-01-01

    Full Text Available Privacy issues have become a major concern in the web of resource sharing, and users often have difficulty managing their information disclosure in the context of high-quality experiences from social media and Internet of Things. Recent studies have shown that users’ disclosure decisions may be influenced by heuristics from the crowds, leading to inconsistency in the disclosure volumes and reduction of the prediction accuracy. Therefore, an analysis of why this influence occurs and how to optimize the user experience is highly important. We propose a novel heuristic model that defines the data structures of items and participants in social media, utilizes a modified decision-tree classifier that can predict participants’ disclosures, and puts forward a correlation analysis for detecting disclosure inconsistences. The heuristic model is applied to real-time dataset to evaluate the behavioral effects. Decision-tree classifier and correlation analysis indeed prove that some participants’ behaviors in information disclosures became decreasingly correlated during item requesting. Participants can be “persuaded” to change their disclosure behaviors, and the users’ answers to the mildly sensitive items tend to be more variable and less predictable. Using this approach, recommender systems in social media can thus know the users better and provide service with higher prediction accuracy.

  17. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  18. Advanced friction modeling in sheet metal forming

    NARCIS (Netherlands)

    Hol, J.; Cid Alfaro, M.V.; Meinders, Vincent T.; Huetink, Han

    2011-01-01

    The Coulomb friction model is frequently used for sheet metal forming simulations. This model incorporates a constant coefficient of friction and does not take the influence of important parameters such as contact pressure or deformation of the sheet material into account. This article presents a

  19. Normal Forms for Reduced Stochastic Climate Models

    Science.gov (United States)

    Franzke, C.; Majda, A.; Crommelin, D.

    2009-04-01

    The systematic development of reduced low-dimensional stochastic climate models from observations or comprehensive high-dimensional climate models is an important topic for low-frequency variability, climate sensitivity, and improved extended range forecasting. Here techniques from applied mathematics are utilized to systematically derive normal forms for reduced stochastic climate models for low-frequency variables. The use of a few Empirical Orthogonal Functions (EOF) depending on observational data to span the low-frequency subspace requires the assessment of dyad interactions besides the more familiar triads in the interaction between the low- and high-frequency subspaces of the dynamics. It will be shown that the dyad and multiplicative triad interactions combine with the climatological linear operator interactions to simultaneously produce both strong nonlinear dissipation and Correlated Additive and Multiplicative (CAM) stochastic noise. For a single low-frequency variable the dyad interactions and climatological linear operator alone produce a normal form with CAM noise from advection of the large-scales by the small scales and simultaneously strong cubic damping. This normal form should prove useful for developing systematic regression fitting strategies for stochastic models of climate data. The validity of the one and two dimensional normal forms will be presented. Also the analytical PDF form for one-dimensional reduced models will be derived. This PDF can exhibit power-law decay only over a limited range and its ultimate decay is determined by the cubic damping. This cubic damping produces a Gaussian tail.

  20. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  1. Context-Aware Generative Adversarial Privacy

    Science.gov (United States)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  2. Towards a Model on the Factors Influencing Social App Users’ Valuation of Interdependent Privacy

    Directory of Open Access Journals (Sweden)

    Pu Yu

    2016-04-01

    Full Text Available In the context of third-party social apps, the problem of interdependency of privacy refers to users making app adoption decisions which cause the collection and utilization of personal information of users’ friends. In contrast, users’ friends have typically little or no direct influence over these decision-making processes.

  3. Factorization of the Ising model form factors

    International Nuclear Information System (INIS)

    Assis, M; McCoy, B M; Maillard, J-M

    2011-01-01

    We present a general method for analytically factorizing the n-fold form factor integrals f (n) N,N (t) for the correlation functions of the Ising model on the diagonal in terms of the hypergeometric functions 2 F 1 ([1/2, N + 1/2]; [N + 1]; t) which appear in the form factor f (1) N,N (t). New quadratic recursion and quartic identities are obtained for the form factors for n = 2, 3. For n = 2, 3, 4 explicit results are given for the form factors. These factorizations are proved for all N for n = 2, 3. These results yield the emergence of palindromic polynomials canonically associated with elliptic curves. As a consequence, understanding the form factors amounts to describing and understanding an infinite set of palindromic polynomials, canonically associated with elliptic curves. From an analytical viewpoint the relation of these palindromic polynomials with hypergeometric functions associated with elliptic curves is made very explicitly, and from a differential algebra viewpoint this corresponds to the emergence of direct sums of differential operators homomorphic to symmetric powers of a second order operator associated with elliptic curve.

  4. Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks.

    Science.gov (United States)

    Li, Song; Cui, Jie; Zhong, Hong; Liu, Lu

    2017-05-05

    Wireless Body Sensor Networks (WBSNs) are gaining importance in the era of the Internet of Things (IoT). The modern medical system is a particular area where the WBSN techniques are being increasingly adopted for various fundamental operations. Despite such increasing deployments of WBSNs, issues such as the infancy in the size, capabilities and limited data processing capacities of the sensor devices restrain their adoption in resource-demanding applications. Though providing computing and storage supplements from cloud servers can potentially enrich the capabilities of the WBSNs devices, data security is one of the prevailing issues that affects the reliability of cloud-assisted services. Sensitive applications such as modern medical systems demand assurance of the privacy of the users' medical records stored in distant cloud servers. Since it is economically impossible to set up private cloud servers for every client, auditing data security managed in the remote servers has necessarily become an integral requirement of WBSNs' applications relying on public cloud servers. To this end, this paper proposes a novel certificateless public auditing scheme with integrated privacy protection. The multi-user model in our scheme supports groups of users to store and share data, thus exhibiting the potential for WBSNs' deployments within community environments. Furthermore, our scheme enriches user experiences by offering public verifiability, forward security mechanisms and revocation of illegal group members. Experimental evaluations demonstrate the security effectiveness of our proposed scheme under the Random Oracle Model (ROM) by outperforming existing cloud-assisted WBSN models.

  5. Data privacy foundations, new developments and the big data challenge

    CERN Document Server

    Torra, Vicenç

    2017-01-01

    This book offers a broad, cohesive overview of the field of data privacy. It discusses, from a technological perspective, the problems and solutions of the three main communities working on data privacy: statistical disclosure control (those with a statistical background), privacy-preserving data mining (those working with data bases and data mining), and privacy-enhancing technologies (those involved in communications and security) communities. Presenting different approaches, the book describes alternative privacy models and disclosure risk measures as well as data protection procedures for respondent, holder and user privacy. It also discusses specific data privacy problems and solutions for readers who need to deal with big data.

  6. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  7. Digital Privacy Legislation Awareness

    OpenAIRE

    Henry Foulds; Magda Huisman; Gunther R. Drevin

    2013-01-01

    Privacy is regarded as a fundamental human right and it is clear that the study of digital privacy is an important field. Digital privacy is influenced by new and constantly evolving technologies and this continuous change makes it hard to create legislation to protect people's privacy from being exploited by misuse of these technologies. This study aims to benefit digital privacy legislation efforts by evaluating the awareness and perceived importance of digital privacy legislation among...

  8. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  9. Remote access methods for exploratory data analysis and statistical modelling: Privacy-Preserving Analytics.

    Science.gov (United States)

    Sparks, Ross; Carter, Chris; Donnelly, John B; O'Keefe, Christine M; Duncan, Jodie; Keighley, Tim; McAullay, Damien

    2008-09-01

    This paper is concerned with the challenge of enabling the use of confidential or private data for research and policy analysis, while protecting confidentiality and privacy by reducing the risk of disclosure of sensitive information. Traditional solutions to the problem of reducing disclosure risk include releasing de-identified data and modifying data before release. In this paper we discuss the alternative approach of using a remote analysis server which does not enable any data release, but instead is designed to deliver useful results of user-specified statistical analyses with a low risk of disclosure. The techniques described in this paper enable a user to conduct a wide range of methods in exploratory data analysis, regression and survival analysis, while at the same time reducing the risk that the user can read or infer any individual record attribute value. We illustrate our methods with examples from biostatistics using publicly available data. We have implemented our techniques into a software demonstrator called Privacy-Preserving Analytics (PPA), via a web-based interface to the R software. We believe that PPA may provide an effective balance between the competing goals of providing useful information and reducing disclosure risk in some situations.

  10. Big data privacy: The datafication of personal information

    DEFF Research Database (Denmark)

    Mai, Jens-Erik

    2016-01-01

    In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model......—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy....... This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information...

  11. Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

    Directory of Open Access Journals (Sweden)

    Abdel-Shakour Abuzneid

    2015-03-01

    Full Text Available Wireless sensor network (WSN consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc. and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC protocol for WSN.

  12. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  13. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  14. Electrically assisted forming modeling and control

    CERN Document Server

    Salandro, Wesley A; Bunget, Cristina; Mears, Laine; Roth, John T

    2015-01-01

    Maximizing reader insights into the latest research findings and applications of Electrically-Assisted Forming (EAF) – whereby metals are formed under an electric current field – this book explains how such a process produces immediate improved formability of metals beyond the extent of thermal softening, and allows metals to be formed to greater elongation with lower mechanical energy as well as allowing for lightweight brittle metals such as magnesium and titanium to be formed without external heating or annealing, enabling the more effective use of these lightweight metals in design. Including case studies that illustrate and support the theoretical content and real-world applications of the techniques discussed, this book also serves to enrich readers understanding of the underlying theories that influence electro-plastic behaviour. The authors have extensive experience in studying Electrically-Assisted Forming and have written extensively on the topic with publications including experimental works, t...

  15. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...

  16. Thermal behaviour modelling of superplastic forming tools

    OpenAIRE

    Velay , Vincent; Cutard , Thierry; Guegan , N.

    2008-01-01

    High-temperature operational conditions of super plastic forming (SPF) tools induce very complex thermomechanical loadings responsible to their failure. Various materials can be used to manufacture forming tools: ceramic, refractory castable or heat resistant steel. In this paper, an experimental and numerical analysis is performed in order to characterise the environmental loadings undergone by the tool whatever the considered material. This investigation allows to lead a thermal calculation...

  17. BangA: An Efficient and Flexible Generalization-Based Algorithm for Privacy Preserving Data Publication

    Directory of Open Access Journals (Sweden)

    Adeel Anjum

    2017-01-01

    Full Text Available Privacy-Preserving Data Publishing (PPDP has become a critical issue for companies and organizations that would release their data. k-Anonymization was proposed as a first generalization model to guarantee against identity disclosure of individual records in a data set. Point access methods (PAMs are not well studied for the problem of data anonymization. In this article, we propose yet another approximation algorithm for anonymization, coined BangA, that combines useful features from Point Access Methods (PAMs and clustering. Hence, it achieves fast computation and scalability as a PAM, and very high quality thanks to its density-based clustering step. Extensive experiments show the efficiency and effectiveness of our approach. Furthermore, we provide guidelines for extending BangA to achieve a relaxed form of differential privacy which provides stronger privacy guarantees as compared to traditional privacy definitions.

  18. Privacy in the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Etter, Michael; Lutz, Christoph

    Report from the EU H2020 Research Project Ps2Share:Participation, Privacy, and Power in the Sharing Economy. This paper gives an in-depth overview of the topic of power in the sharing economy. It forms one part of a European Union Horizon 2020 Research Project on the sharing economy: "Ps2Share...... Participation, Privacy, and Power in the Sharing Economy". We aim to foster better awareness of the consequences which the sharing economy has on the way people behave, think, interact, and socialize across Europe. Our overarching objective is to identify key challenges of the sharing economy and improve Europe......’s digital services through providing recommendations to Europe’s institutions. The initial stage of this research project involves a set of three literature reviews of the state of research on three core topics in relation to the sharing economy: participation (1), privacy (2), and power (3). This piece...

  19. Privacy-invading technologies : safeguarding privacy, liberty & security in the 21st century

    NARCIS (Netherlands)

    Klitou, Demetrius

    2012-01-01

    With a focus on the growing development and deployment of the latest technologies that threaten privacy, the PhD dissertation argues that the US and UK legal frameworks, in their present form, are inadequate to defend privacy and other civil liberties against the intrusive capabilities of body

  20. On Fences, Forms and Mathematical Modeling

    Science.gov (United States)

    Lege, Jerry

    2009-01-01

    The white picket fence is an integral component of the iconic American townscape. But, for mathematics students, it can be a mathematical challenge. Picket fences in a variety of styles serve as excellent sources to model constant, step, absolute value, and sinusoidal functions. "Principles and Standards for School Mathematics" (NCTM 2000)…

  1. A Clustering Approach for the l-Diversity Model in Privacy Preserving Data Mining Using Fractional Calculus-Bacterial Foraging Optimization Algorithm

    Directory of Open Access Journals (Sweden)

    Pawan R. Bhaladhare

    2014-01-01

    Full Text Available In privacy preserving data mining, the l-diversity and k-anonymity models are the most widely used for preserving the sensitive private information of an individual. Out of these two, l-diversity model gives better privacy and lesser information loss as compared to the k-anonymity model. In addition, we observe that numerous clustering algorithms have been proposed in data mining, namely, k-means, PSO, ACO, and BFO. Amongst them, the BFO algorithm is more stable and faster as compared to all others except k-means. However, BFO algorithm suffers from poor convergence behavior as compared to other optimization algorithms. We also observed that the current literature lacks any approaches that apply BFO with l-diversity model to realize privacy preservation in data mining. Motivated by this observation, we propose here an approach that uses fractional calculus (FC in the chemotaxis step of the BFO algorithm. The FC is used to boost the computational performance of the algorithm. We also evaluate our proposed FC-BFO and BFO algorithms empirically, focusing on information loss and execution time as vital metrics. The experimental evaluation shows that our proposed FC-BFO algorithm derives an optimal cluster as compared to the original BFO algorithm and existing clustering algorithms.

  2. Explicit boundary form factors: The scaling Lee–Yang model

    Energy Technology Data Exchange (ETDEWEB)

    Hollo, L. [MTA Lendület Holographic QFT Group, Wigner Research Centre for Physics, P.O.B. 49, H-1525 Budapest 114 (Hungary); Laczko, Z.B. [Roland Eötvös University, Pázmány Péter sétány 1/A, 1117 Budapest (Hungary); Bajnok, Z. [MTA Lendület Holographic QFT Group, Wigner Research Centre for Physics, P.O.B. 49, H-1525 Budapest 114 (Hungary)

    2014-09-15

    We provide explicit expressions for boundary form factors in the boundary scaling Lee–Yang model for operators with the mildest ultraviolet behavior for all integrable boundary conditions. The form factors of the boundary stress tensor take a determinant form, while the form factors of the boundary primary field contain additional explicit polynomials.

  3. Neuroethics and Brain Privacy

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2017-01-01

    An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology.......An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology....

  4. Privacy Verification Using Ontologies

    NARCIS (Netherlands)

    Kost, Martin; Freytag, Johann-Christoph; Kargl, Frank; Kung, Antonio

    2011-01-01

    As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a

  5. Privacy and Social Interaction

    NARCIS (Netherlands)

    Roessler, B.; Mokrosinska, D.

    2013-01-01

    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an

  6. Smartdata privacy meets evolutionary robotics

    CERN Document Server

    Harvey, Inman; Tomko, George

    2013-01-01

    Privacy by Design and the Promise of SmartData.- SmartData: the Need, the Goal and the Challenge.- Perspectives on Artificial Intelligence.- Context dependent information processing entails scale-free dynamics.- Philosophy and SmartData.- Relevance Realization and the Neurodynamics and Neural Connectivity of General Intelligence.- What Matters: Real Bodies and Virtual Worlds.- The development of autonomous virtual agents.- Patterns of Attractors in the "Brain"".- A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services.- Unconstraint the Population: the Benefits of Horiz

  7. Video Surveillance: Privacy Issues and Legal Compliance

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2015-01-01

    Pervasive usage of video surveillance is rapidly increasing in developed countries. Continuous security threats to public safety demand use of such systems. Contemporary video surveillance systems offer advanced functionalities which threaten the privacy of those recorded in the video. There is a......Pervasive usage of video surveillance is rapidly increasing in developed countries. Continuous security threats to public safety demand use of such systems. Contemporary video surveillance systems offer advanced functionalities which threaten the privacy of those recorded in the video....... There is a need to balance the usage of video surveillance against its negative impact on privacy. This chapter aims to highlight the privacy issues in video surveillance and provides a model to help identify the privacy requirements in a video surveillance system. The authors make a step in the direction...

  8. Efficient Dynamic Searchable Encryption with Forward Privacy

    Directory of Open Access Journals (Sweden)

    Etemad Mohammad

    2018-01-01

    Full Text Available Searchable symmetric encryption (SSE enables a client to perform searches over its outsourced encrypted files while preserving privacy of the files and queries. Dynamic schemes, where files can be added or removed, leak more information than static schemes. For dynamic schemes, forward privacy requires that a newly added file cannot be linked to previous searches. We present a new dynamic SSE scheme that achieves forward privacy by replacing the keys revealed to the server on each search. Our scheme is efficient and parallelizable and outperforms the best previous schemes providing forward privacy, and achieves competitive performance with dynamic schemes without forward privacy. We provide a full security proof in the random oracle model. In our experiments on the Wikipedia archive of about four million pages, the server takes one second to perform a search with 100,000 results.

  9. Social Media Users’ Legal Consciousness About Privacy

    Directory of Open Access Journals (Sweden)

    Katharine Sarikakis

    2017-02-01

    Full Text Available This article explores the ways in which the concept of privacy is understood in the context of social media and with regard to users’ awareness of privacy policies and laws in the ‘Post-Snowden’ era. In the light of presumably increased public exposure to privacy debates, generated partly due to the European “Right to be Forgotten” ruling and the Snowden revelations on mass surveillance, this article explores users’ meaning-making of privacy as a matter of legal dimension in terms of its violations and threats online and users’ ways of negotiating their Internet use, in particular social networking sites. Drawing on the concept of legal consciousness, this article explores through focus group interviews the ways in which social media users negotiate privacy violations and what role their understanding of privacy laws (or lack thereof might play in their strategies of negotiation. The findings are threefold: first, privacy is understood almost universally as a matter of controlling one’s own data, including information disclosure even to friends, and is strongly connected to issues about personal autonomy; second, a form of resignation with respect to control over personal data appears to coexist with a recognized need to protect one’s private data, while respondents describe conscious attempts to circumvent systems of monitoring or violation of privacy, and third, despite widespread coverage of privacy legal issues in the press, respondents’ concerns about and engagement in “self-protecting” tactics derive largely from being personally affected by violations of law and privacy.

  10. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2017-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  11. δ-dependency for privacy-preserving XML data publishing.

    Science.gov (United States)

    Landberg, Anders H; Nguyen, Kinh; Pardede, Eric; Rahayu, J Wenny

    2014-08-01

    An ever increasing amount of medical data such as electronic health records, is being collected, stored, shared and managed in large online health information systems and electronic medical record systems (EMR) (Williams et al., 2001; Virtanen, 2009; Huang and Liou, 2007) [1-3]. From such rich collections, data is often published in the form of census and statistical data sets for the purpose of knowledge sharing and enabling medical research. This brings with it an increasing need for protecting individual people privacy, and it becomes an issue of great importance especially when information about patients is exposed to the public. While the concept of data privacy has been comprehensively studied for relational data, models and algorithms addressing the distinct differences and complex structure of XML data are yet to be explored. Currently, the common compromise method is to convert private XML data into relational data for publication. This ad hoc approach results in significant loss of useful semantic information previously carried in the private XML data. Health data often has very complex structure, which is best expressed in XML. In fact, XML is the standard format for exchanging (e.g. HL7 version 3(1)) and publishing health information. Lack of means to deal directly with data in XML format is inevitably a serious drawback. In this paper we propose a novel privacy protection model for XML, and an algorithm for implementing this model. We provide general rules, both for transforming a private XML schema into a published XML schema, and for mapping private XML data to the new privacy-protected published XML data. In addition, we propose a new privacy property, δ-dependency, which can be applied to both relational and XML data, and that takes into consideration the hierarchical nature of sensitive data (as opposed to "quasi-identifiers"). Lastly, we provide an implementation of our model, algorithm and privacy property, and perform an experimental analysis

  12. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... FEDERAL RESERVE SYSTEM 12 CFR Part 261a [Docket No. R-1313] Privacy Act of 1974; Privacy Act... implementing the Privacy Act of 1974 (Privacy Act). The primary changes concern the waiver of copying fees... records under the Privacy Act; the amendment of special procedures for the release of medical records to...

  13. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  14. Integrated thermomechanical model for forming of glass containers

    Directory of Open Access Journals (Sweden)

    Martins Bruno

    2016-01-01

    Full Text Available In this work an integrated model for all the process of glass forming of glass containers is presented. The model addresses press-and-blow and blow-and-blow procedures from the gob forming to the final product. Glass forming involves coupled thermal-mechanical physical phenomena, in which the material viscous flow is highly dependent on heat transfer which, in turn, is dependent changes of shape due to material flow. Numerical aspects associated with the model implementation and its validation with real formed products are discussed.

  15. Pulsar average wave forms and hollow-cone beam models

    Science.gov (United States)

    Backer, D. C.

    1976-01-01

    Pulsar wave forms have been analyzed from observations conducted over a wide radio-frequency range to assess the wave-form morphologies and to measure wave-form widths. The results of the analysis compare favorably with the predictions of a model with a hollow-cone beam of fixed dimensions and with random orientation of both the observer and the cone axis with respect to the pulsar spin axis. A class of three-component wave forms is included in the model by adding a central pencil beam to the hollow-cone hypothesis. The consequences of a number of discrepancies between observations and quantitative predictions of the model are discussed.

  16. Exploratory Topology Modelling of Form-Active Hybrid Structures

    DEFF Research Database (Denmark)

    Holden Deleuran, Anders; Pauly, Mark; Tamke, Martin

    2016-01-01

    The development of novel form-active hybrid structures (FAHS) is impeded by a lack of modelling tools that allow for exploratory topology modelling of shaped assemblies. We present a flexible and real-time computational design modelling pipeline developed for the exploratory modelling of FAHS...... that enables designers and engineers to iteratively construct and manipulate form-active hybrid assembly topology on the fly. The pipeline implements Kangaroo2's projection-based methods for modelling hybrid structures consisting of slender beams and cable networks. A selection of design modelling sketches...... is presented in which the developed modelling pipeline has been integrated to explore the design space delineated by FAHS....

  17. 17 CFR Appendix to Subpart B of... - Model Forms

    Science.gov (United States)

    2010-04-01

    ... investment companies, investment advisers, transfer agents, and broker-dealers] affiliates, from marketing...) REGULATIONS S-P AND S-AM Regulation S-AM: Limitations on Affiliate Marketing Pt. 248, Subpt. B, App. Appendix...—Model Form for Renewal Notice (Joint Notice) A-5—Model Form for Voluntary “No Marketing” Notice A-1...

  18. Formability models for warm sheet metal forming analysis

    Science.gov (United States)

    Jiang, Sen

    Several closed form models for the prediction of strain space sheet metal formability as a function of temperature and strain rate are proposed. The proposed models require only failure strain information from the uniaxial tension test at an elevated temperature setting and failure strain information from the traditionally defined strain space forming limit diagram at room temperature, thereby featuring the advantage of offering a full forming limit description without having to carry out expensive experimental studies for multiple modes of deformation under the elevated temperature. The Power law, Voce, and Johnson-Cook hardening models are considered along with the yield criterions of Hill's 48 and Logan-Hosford yield criteria. Acceptable correlations between the theory and experiment are reported for all the models under a plane strain condition. Among all the proposed models, the model featuring Johnson-Cook hardening model and Logan-Hosford yield behavior (LHJC model) was shown to best correlate with experiment. The sensitivity of the model with respect to various forming parameters is discussed. This work is significant to those aiming to incorporate closed-form formability models directly into numerical simulation programs for the purpose of design and analysis of products manufactured through the warm sheet metal forming process. An improvement based upon Swift's diffuse necking theory, is suggested in order to enhance the reliability of the model for biaxial stretch conditions. Theory relating to this improvement is provided in Appendix B.

  19. The Influence of Security Statement, Technical Protection, and Privacy on Satisfaction and Loyalty; A Structural Equation Modeling

    Science.gov (United States)

    Peikari, Hamid Reza

    Customer satisfaction and loyalty have been cited as the e-commerce critical success factors and various studies have been conducted to find the antecedent determinants of these concepts in the online transactions. One of the variables suggested by some studies is perceived security. However, these studies have referred to security from a broad general perspective and no attempts have been made to study the specific security related variables. This paper intends to study the influence on security statement and technical protection on satisfaction, loyalty and privacy. The data was collected from 337 respondents and after the reliability and validity tests, path analysis was applied to examine the hypotheses. The results suggest that loyalty is influenced by satisfaction and security statement and no empirical support was found for the influence on technical protection and privacy on loyalty. Moreover, it was found that security statement and technical protection have a positive significant influence on satisfaction while no significant effect was found for privacy. Furthermore, the analysis indicated that security statement have a positive significant influence on technical protection while technical protection was found to have a significant negative impact on perceived privacy.

  20. Topology Model of the Flow around a Submarine Hull Form

    Science.gov (United States)

    2015-12-01

    UNCLASSIFIED Topology Model of the Flow around a Submarine Hull Form S.-K. Lee Maritime Division Defence Science and Technology Group DST-Group–TR...3177 ABSTRACT A topology model constructed from surface-streamer visualisation describes the flow around a generic conventional submarine hull form at...7999 c© Commonwealth of Australia 2015 AR-016-453 December, 2015 APPROVED FOR PUBLIC RELEASE UNCLASSIFIED UNCLASSIFIED Topology Model of the Flow

  1. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    NARCIS (Netherlands)

    Bodó, B.

    2014-01-01

    This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of

  2. Disease prevention versus data privacy: using landcover maps to inform spatial epidemic models.

    Directory of Open Access Journals (Sweden)

    Michael J Tildesley

    Full Text Available The availability of epidemiological data in the early stages of an outbreak of an infectious disease is vital for modelers to make accurate predictions regarding the likely spread of disease and preferred intervention strategies. However, in some countries, the necessary demographic data are only available at an aggregate scale. We investigated the ability of models of livestock infectious diseases to predict epidemic spread and obtain optimal control policies in the event of imperfect, aggregated data. Taking a geographic information approach, we used land cover data to predict UK farm locations and investigated the influence of using these synthetic location data sets upon epidemiological predictions in the event of an outbreak of foot-and-mouth disease. When broadly classified land cover data were used to create synthetic farm locations, model predictions deviated significantly from those simulated on true data. However, when more resolved subclass land use data were used, moderate to highly accurate predictions of epidemic size, duration and optimal vaccination and ring culling strategies were obtained. This suggests that a geographic information approach may be useful where individual farm-level data are not available, to allow predictive analyses to be carried out regarding the likely spread of disease. This method can also be used for contingency planning in collaboration with policy makers to determine preferred control strategies in the event of a future outbreak of infectious disease in livestock.

  3. Model of assessment of requirements of privacy, security and quality of service for mobile medical applications

    Directory of Open Access Journals (Sweden)

    Edward Paul Guillen Pinto

    2017-08-01

    Full Text Available Introduction: The development of mobile technologies has facilitated the creation of mHealth applications, which are considered key tools for safe and quality care for patients from remote populations and with lack of infrastructure for the provision of health services. The article considers a proposal for an evaluation model that allows to determine weaknesses and vulnerabilities at the security level and quality of service (QoS in mHealth applications. Objective: To carry out an approximation of a model of analysis that supports the decision making, concerning the use and production of safe applications, minimizing the impact and the probability of occurrence of the risks of computer security. Materials and methods: The type of applied research is of a descriptive type, because each one details the characteristics that the mobile health applications must have to achieve an optimum level of safety. The methodology uses the rules that regulate applications and mixes them with techniques of security analysis, using the characterization of risks posed by Open Web Application Security Project-OWASP and the QoS requirements of the International Telecommunication Union-ITU. Results: An effective analysis was obtained in actual current applications, which shows their weaknesses and the aspects to be corrected to comply with appropriate security parameters. Conclusions: The model allows to evaluate the safety and quality of service (QoS requirements of mobile health applications that can be used to evaluate current applications or to generate the criteria before deployment.

  4. Privacy Training Program

    Science.gov (United States)

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  5. A4 see-saw models and form dominance

    International Nuclear Information System (INIS)

    Chen, M-C; King, Stephen F.

    2009-01-01

    We introduce the idea of Form Dominance in the (type I) see-saw mechanism, according to which a particular right-handed neutrino mass eigenstate is associated with a particular physical neutrino mass eigenstate, leading to a form diagonalizable effective neutrino mass matrix. Form Dominance, which allows an arbitrary neutrino mass spectrum, may be regarded as a generalization of Constrained Sequential Dominance which only allows strongly hierarchical neutrino masses. We consider alternative implementations of the see-saw mechanism in minimal A 4 see-saw models and show that such models satisfy Form Dominance, leading to neutrino mass sum rules which predict closely spaced neutrino masses with a normal or inverted neutrino mass ordering. To avoid the partial cancellations inherent in such models we propose Natural Form Dominance, in which a different flavon is associated with each physical neutrino mass eigenstate.

  6. Review of friction modeling in metal forming processes

    DEFF Research Database (Denmark)

    Nielsen, C.V.; Bay, N.

    2018-01-01

    Abstract In metal forming processes, friction between tool and workpiece is an important parameter influencing the material flow, surface quality and tool life. Theoretical models of friction in metal forming are based on analysis of the real contact area in tool-workpiece interfaces. Several res...

  7. Overview of friction modelling in metal forming processes

    DEFF Research Database (Denmark)

    Nielsen, Chris Valentin; Bay, Niels Oluf

    2017-01-01

    In metal forming processes, friction between tool and workpiece is an important parameter influencing the material flow, surface quality and tool life. Theoretical models of friction in metal forming are based on analysis of the real contact area in tool-workpiece interfaces. Several research gro...

  8. Nucleon form factors in the projected linear chiral soliton model

    International Nuclear Information System (INIS)

    Alberto, P.; Coimbra Univ.; Coimbra Univ.; Ruiz Arriola, E.; Gruemmer, F.; Fiolhais, M.; Urbano, J.N.; Coimbra Univ.; Goeke, K.; Bochum Univ.

    1988-01-01

    Electromagnetic and axial form factors of the nucleon are evaluated using the lagrangian of the linear chiral soliton model. To this end angular momentum and isospin projected mean field solutions are determined variationally assuming valence quarks and pions in generalized hedgehog configurations. With the proper pion decay constant and after fitting the quark-meson coupling constant to the nucleon energy both proton and neutron charge form factors are reproduced as well as the slope of the magnetic ones. The axial form factor agrees less well with experiment. The pion form factor can be approximated by a monopole with a cut-off mass of 690 MeV. (orig.)

  9. Cost damping and functional form in transport models

    DEFF Research Database (Denmark)

    Rich, Jeppe; Mabit, Stefan Lindhard

    2016-01-01

    take different forms and be represented as a non-linear-in-parameter form such as the well-known Box–Cox function. However, it could also be specified as non-linear-in-cost but linear-in-parameter forms, which are easier to estimate and improve model fit without increasing the number of parameters....... The specific contributions of the paper are as follows. Firstly, we discuss the phenomenon of cost damping in details and specifically why it occurs. Secondly, we provide a test of damping and an easy assessment of the (linear) damping rate for any variable by estimating two auxiliary linear models. This turns......Transport models allowing for cost damping are characterised by marginally decreasing cost sensitivities in demand. As a result, cost damping is a model extension of the simple linear-in-cost model requiring an appropriate non-linear link function between utility and cost. The link function may...

  10. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  11. Privacy enhanced recommender system

    NARCIS (Netherlands)

    Erkin, Zekeriya; Erkin, Zekeriya; Beye, Michael; Veugen, Thijs; Lagendijk, Reginald L.

    2010-01-01

    Recommender systems are widely used in online applications since they enable personalized service to the users. The underlying collaborative filtering techniques work on user’s data which are mostly privacy sensitive and can be misused by the service provider. To protect the privacy of the users, we

  12. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for

  13. Development of a Prototype Model-Form Uncertainty Knowledge Base

    Science.gov (United States)

    Green, Lawrence L.

    2016-01-01

    Uncertainties are generally classified as either aleatory or epistemic. Aleatory uncertainties are those attributed to random variation, either naturally or through manufacturing processes. Epistemic uncertainties are generally attributed to a lack of knowledge. One type of epistemic uncertainty is called model-form uncertainty. The term model-form means that among the choices to be made during a design process within an analysis, there are different forms of the analysis process, which each give different results for the same configuration at the same flight conditions. Examples of model-form uncertainties include the grid density, grid type, and solver type used within a computational fluid dynamics code, or the choice of the number and type of model elements within a structures analysis. The objectives of this work are to identify and quantify a representative set of model-form uncertainties and to make this information available to designers through an interactive knowledge base (KB). The KB can then be used during probabilistic design sessions, so as to enable the possible reduction of uncertainties in the design process through resource investment. An extensive literature search has been conducted to identify and quantify typical model-form uncertainties present within aerospace design. An initial attempt has been made to assemble the results of this literature search into a searchable KB, usable in real time during probabilistic design sessions. A concept of operations and the basic structure of a model-form uncertainty KB are described. Key operations within the KB are illustrated. Current limitations in the KB, and possible workarounds are explained.

  14. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  15. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  16. Numerical Modelling of Drawbeads for Forming of Aluminium Alloys

    OpenAIRE

    Joshi, Y; Christiansen, Peter; Masters, I; Bay, Niels Oluf; Dashwood, R

    2016-01-01

    The drawbeads in stamping tools are usually designed based on experience from the forming of steel. However, aluminium alloys display different forming behaviour to steels, which is not reflected in the drawbead design for tools used for stamping aluminium. This paper presents experimental results from different semi-circular drawbead geometries commonly encountered in automotive dies and compares them to those obtained from Stoughton’s analytical drawbead model and the 2D plane strain drawbe...

  17. Electromagnetic form factors in a collective model of the nucleon

    Energy Technology Data Exchange (ETDEWEB)

    Bijker, R.; Iachello, F.; Leviatan, A. [Instituto de Ciencias Nucleares, Universidad Nacional Autonoma de Mexico, Apartado Postal 70-543, 04510 (Mexico)]|[Distrito Federale (Mexico)]|[Center for Theoretical Physics, Sloane Laboratory, Yale University, New Haven, Connecticut 06520-8120 (United States)]|[Racah Institute of Physics, The Hebrew University, Jerusalem 91904 (Israel)

    1996-10-01

    We study the electromagnetic form factors of the nucleon in a collective model of baryons. Using the algebraic approach to hadron structure, we derive closed expressions for both elastic and transition form factors, and consequently for the helicity amplitudes that can be measured in electro- and photoproduction. Effects of spin-flavor symmetry breaking and of swelling of hadrons with increasing excitation energy are considered. {copyright} {ital 1996 The American Physical Society.}

  18. Electromagnetic form factors in a collective model of the nucleon

    International Nuclear Information System (INIS)

    Bijker, R.; Iachello, F.; Leviatan, A.

    1996-01-01

    We study the electromagnetic form factors of the nucleon in a collective model of baryons. Using the algebraic approach to hadron structure, we derive closed expressions for both elastic and transition form factors, and consequently for the helicity amplitudes that can be measured in electro- and photoproduction. Effects of spin-flavor symmetry breaking and of swelling of hadrons with increasing excitation energy are considered. copyright 1996 The American Physical Society

  19. Viscous and thermal modelling of thermoplastic composites forming process

    Science.gov (United States)

    Guzman, Eduardo; Liang, Biao; Hamila, Nahiene; Boisse, Philippe

    2016-10-01

    Thermoforming thermoplastic prepregs is a fast manufacturing process. It is suitable for automotive composite parts manufacturing. The simulation of thermoplastic prepreg forming is achieved by alternate thermal and mechanical analyses. The thermal properties are obtained from a mesoscopic analysis and a homogenization procedure. The forming simulation is based on a viscous-hyperelastic approach. The thermal simulations define the coefficients of the mechanical model that depend on the temperature. The forming simulations modify the boundary conditions and the internal geometry of the thermal analyses. The comparison of the simulation with an experimental thermoforming of a part representative of automotive applications shows the efficiency of the approach.

  20. Simulation of root forms using cellular automata model

    Energy Technology Data Exchange (ETDEWEB)

    Winarno, Nanang, E-mail: nanang-winarno@upi.edu; Prima, Eka Cahya [International Program on Science Education, Universitas Pendidikan Indonesia, Jl. Dr. Setiabudi no 229, Bandung40154 (Indonesia); Afifah, Ratih Mega Ayu [Department of Physics Education, Post Graduate School, Universitas Pendidikan Indonesia, Jl. Dr. Setiabudi no 229, Bandung40154 (Indonesia)

    2016-02-08

    This research aims to produce a simulation program for root forms using cellular automata model. Stephen Wolfram in his book entitled “A New Kind of Science” discusses the formation rules based on the statistical analysis. In accordance with Stephen Wolfram’s investigation, the research will develop a basic idea of computer program using Delphi 7 programming language. To best of our knowledge, there is no previous research developing a simulation describing root forms using the cellular automata model compared to the natural root form with the presence of stone addition as the disturbance. The result shows that (1) the simulation used four rules comparing results of the program towards the natural photographs and each rule had shown different root forms; (2) the stone disturbances prevent the root growth and the multiplication of root forms had been successfully modeled. Therefore, this research had added some stones, which have size of 120 cells placed randomly in the soil. Like in nature, stones cannot be penetrated by plant roots. The result showed that it is very likely to further develop the program of simulating root forms by 50 variations.

  1. Digital models: How can dental arch form be verified chairside?

    Science.gov (United States)

    Tavares, Alana; Braga, Emanuel; de Araújo, Telma Martins

    2017-01-01

    ABSTRACT Introduction: Plaster dental casts are routinely used during clinical practice to access maxillary dental arch form and assist on fabrication of individualized orthodontic archwires. Recently introduced, digital model technology may offer a limitation for the obtainment of a dental physical record. In this context, a tool for dental arch form assessment for chairside use is necessary when employing digital models. In this regard, paper print of the dental arch seems thus to be useful. Methods: In the present study, 37 lower arch models were used. Intercanine and intermolar widths and dental arch length measurements were performed and compared using plaster dental casts, digital models and paper print image of the models. Ortho Insight 3D scanner was employed for model digitalization. Results: No statistically significant differences were noted regarding the measurements performed on the plaster or digital models (p> 0.05). Paper print images, however, showed subestimated values for intercanine and intermolar widths and overestimated values for dental arch length. Despite being statistically significant (p< 0.001), the differences were considered clinically negligible. Conclusion: The present study suggests that paper print images obtained from digital models are clinically accurate and can be used as a tool for dental arch form assessment for fabrication of individualized orthodontic archwires. PMID:29364382

  2. Digital models: How can dental arch form be verified chairside?

    Directory of Open Access Journals (Sweden)

    Alana Tavares

    Full Text Available ABSTRACT Introduction: Plaster dental casts are routinely used during clinical practice to access maxillary dental arch form and assist on fabrication of individualized orthodontic archwires. Recently introduced, digital model technology may offer a limitation for the obtainment of a dental physical record. In this context, a tool for dental arch form assessment for chairside use is necessary when employing digital models. In this regard, paper print of the dental arch seems thus to be useful. Methods: In the present study, 37 lower arch models were used. Intercanine and intermolar widths and dental arch length measurements were performed and compared using plaster dental casts, digital models and paper print image of the models. Ortho Insight 3D scanner was employed for model digitalization. Results: No statistically significant differences were noted regarding the measurements performed on the plaster or digital models (p> 0.05. Paper print images, however, showed subestimated values for intercanine and intermolar widths and overestimated values for dental arch length. Despite being statistically significant (p< 0.001, the differences were considered clinically negligible. Conclusion: The present study suggests that paper print images obtained from digital models are clinically accurate and can be used as a tool for dental arch form assessment for fabrication of individualized orthodontic archwires.

  3. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  4. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  5. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  6. Numerical Modelling of Drawbeads for Forming of Aluminium Alloys

    Science.gov (United States)

    Joshi, Y.; Christiansen, P.; Masters, I.; Bay, N.; Dashwood, R.

    2016-08-01

    The drawbeads in stamping tools are usually designed based on experience from the forming of steel. However, aluminium alloys display different forming behaviour to steels, which is not reflected in the drawbead design for tools used for stamping aluminium. This paper presents experimental results from different semi-circular drawbead geometries commonly encountered in automotive dies and compares them to those obtained from Stoughton's analytical drawbead model and the 2D plane strain drawbead model set up using LS-DYNA. The study was conducted on lubricated NG5754 strips. The results presented are in terms of drawbead restraining force versus strip displacement, as a function of drawbead depth. The FE drawbead model agrees well with the experiments whereas the analytical model overpredicted the drawbead forces.

  7. Comparative Approaches to Biobanks and Privacy.

    Science.gov (United States)

    Rothstein, Mark A; Knoppers, Bartha Maria; Harrell, Heather L

    2016-03-01

    Laws in the 20 jurisdictions studied for this project display many similar approaches to protecting privacy in biobank research. Although few have enacted biobank-specific legislation, many countries address biobanking within other laws. All provide for some oversight mechanisms for biobank research, even though the nature of that oversight varies between jurisdictions. Most have some sort of controlled access system in place for research with biobank specimens. While broad consent models facilitate biobanking, countries without national or federated biobanks have been slow to adopt broad consent. International guidelines have facilitated sharing and generally take a proportional risk approach, but many countries have provisions guiding international sharing and a few even limit international sharing. Although privacy laws may not prohibit international collaborations, the multi-prong approach to privacy unique to each jurisdiction can complicate international sharing. These symposium issues can serve as a resource for explaining the sometimes intricate privacy laws in each studied jurisdiction, outlining the key issues with regards to privacy and biobanking, and serving to describe a framework for the process of harmonization of privacy laws. © 2016 American Society of Law, Medicine & Ethics.

  8. FCJ-195 Privacy, Responsibility, and Human Rights Activism

    Directory of Open Access Journals (Sweden)

    Becky Kazansky

    2015-06-01

    Full Text Available In this article, we argue that many difficulties associated with the protection of digital privacy are rooted in the framing of privacy as a predominantly individual responsibility. We examine how models of privacy protection, such as Notice and Choice, contribute to the ‘responsibilisation’ of human rights activists who rely on the use of technologies for their work. We also consider how a group of human rights activists countered technology-mediated threats that this ‘responsibilisation’ causes by developing a collective approach to address their digital privacy and security needs. We conclude this article by discussing how technological tools used to maintain or counter the loss of privacy can be improved in order to support the privacy and digital security of human rights activists.

  9. Challenges in Modeling the Degradation of Ceramic Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    Devanathan, Ramaswami; Gao, Fei; Sun, Xin

    2011-09-01

    We identify the state of the art, gaps in current understanding, and key research needs in the area of modeling the long-term degradation of ceramic waste forms for nuclear waste disposition. The directed purpose of this report is to define a roadmap for Waste IPSC needs to extend capabilities of waste degradation to ceramic waste forms, which overlaps with the needs of the subconsinuum scale of FMM interests. The key knowledge gaps are in the areas of (i) methodology for developing reliable interatomic potentials to model the complex atomic-level interactions in waste forms; (ii) characterization of water interactions at ceramic surfaces and interfaces; and (iii) extension of atomic-level insights to the long time and distance scales relevant to the problem of actinide and fission product immobilization.

  10. A Model of the Platform-Ecosystem Organizational Form

    Directory of Open Access Journals (Sweden)

    Moshe Yonatany

    2013-08-01

    Full Text Available Technological advancements are driving the evolution of a form of organizing economic activity – the platform-ecosystem – particularly in a variety of ICT-enabled industries. This article builds on calls to more adequately describe and explain this form of organizing (Alberts, 2012; Baldwin, 2012; Tushman, Lakhani, & Lifshitz-Assaf, 2012. I propose a preliminary model that highlights the fundamental economic variables in the platform-ecosystem organizational form: knowledge substitution and powerful incentives. The model emphasizes knowledge-based considerations, suggesting the view that the main purpose of ICT-enabled platforms, such as smartphones, game consoles, and Internet services, is the development of complementary products, services, and technologies.

  11. Zero modes method and form factors in quantum integrable models

    Directory of Open Access Journals (Sweden)

    S. Pakuliak

    2015-04-01

    Full Text Available We study integrable models solvable by the nested algebraic Bethe ansatz and possessing GL(3-invariant R-matrix. Assuming that the monodromy matrix of the model can be expanded into series with respect to the inverse spectral parameter, we define zero modes of the monodromy matrix entries as the first nontrivial coefficients of this series. Using these zero modes we establish new relations between form factors of the elements of the monodromy matrix. We prove that all of them can be obtained from the form factor of a diagonal matrix element in special limits of Bethe parameters. As a result we obtain determinant representations for form factors of all the entries of the monodromy matrix.

  12. Achieving Optimal Privacy in Trust-Aware Social Recommender Systems

    Science.gov (United States)

    Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail

    Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.

  13. Form factors in the projected linear chiral sigma model

    International Nuclear Information System (INIS)

    Alberto, P.; Coimbra Univ.; Bochum Univ.; Ruiz Arriola, E.; Fiolhais, M.; Urbano, J.N.; Coimbra Univ.; Goeke, K.; Gruemmer, F.; Bochum Univ.

    1990-01-01

    Several nucleon form factors are computed within the framework of the linear chiral soliton model. To this end variational means and projection techniques applied to generalized hedgehog quark-boson Fock states are used. In this procedure the Goldberger-Treiman relation and a virial theorem for the pion-nucleon form factor are well fulfilled demonstrating the consistency of the treatment. Both proton and neutron charge form factors are correctly reproduced, as well as the proton magnetic one. The shapes of the neutron magnetic and of the axial form factors are good but their absolute values at the origin are too large. The slopes of all the form factors at zero momentum transfer are in good agreement with the experimental data. The pion-nucleon form factor exhibits to great extent a monopole shape with a cut-off mass of Λ=690 MeV. Electromagnetic form factors for the vertex γNΔ and the nucleon spin distribution are also evaluated and discussed. (orig.)

  14. Star-forming galaxy models: Blending star formation into TREESPH

    Science.gov (United States)

    Mihos, J. Christopher; Hernquist, Lars

    1994-01-01

    We have incorporated star-formation algorithms into a hybrid N-body/smoothed particle hydrodynamics code (TREESPH) in order to describe the star forming properties of disk galaxies over timescales of a few billion years. The models employ a Schmidt law of index n approximately 1.5 to calculate star-formation rates, and explicitly include the energy and metallicity feedback into the Interstellar Medium (ISM). Modeling the newly formed stellar population is achieved through the use of hybrid SPH/young star particles which gradually convert from gaseous to collisionless particles, avoiding the computational difficulties involved in creating new particles. The models are shown to reproduce well the star-forming properties of disk galaxies, such as the morphology, rate of star formation, and evolution of the global star-formation rate and disk gas content. As an example of the technique, we model an encounter between a disk galaxy and a small companion which gives rise to a ring galaxy reminiscent of the Cartwheel (AM 0035-35). The primary galaxy in this encounter experiences two phases of star forming activity: an initial period during the expansion of the ring, and a delayed phase as shocked material in the ring falls back into the central regions.

  15. 31 CFR 50.17 - Use of model forms.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Use of model forms. 50.17 Section 50.17 Money and Finance: Treasury Office of the Secretary of the Treasury TERRORISM RISK INSURANCE... requirements of § 50.15 may be developed. (f) Definitions. For purposes of this section, references to NAIC...

  16. The Factors of Forming the National HR-Management Model

    Directory of Open Access Journals (Sweden)

    Elena P. Kostenko

    2017-12-01

    Full Text Available There are some factors considered in this article, which influence the forming of national HR-management model. The group-forming criterion is the nature of factors, that determine the system of HR-management as a system of corporate culture values, norms and rules of organizational behavior, ways of realization some important managing functions and dominating approaches to make decisions. This article shows that the plurality of combinations in different factors leads to forming the unique HR-management model. The geoclimatic factor influences the principles of the labor organization (orientation primarily on individual or collective forms of labor, attitude to the management experience of other countries, attitude to resources, etc., the distribution of labor resources, the level of labor mobility, and the psychosocial type of employee. Models of man's labor behavior are constituted In the process of historical development. Attention is focused on the formation of a national HR-model, such as the conducted socio-economic policy, the characteristics of the institutional environment, economic goals and priorities of the country's development, the level of development and the nature of the national productive forces and economic structures. Much attention was paid to the analysis of the historically formed value system and labor traditions, which influence the approaches to HR-management. As far as religion influences the model of person’s inclusion in labor, motives of labor behavior, management culture of a certain employee, preferred payment etc., we examined how the main traditional religions (Christianity, Islam, Judaism, Buddhism, Confucianism, Hinduism influence the HR-management system in different countries.

  17. Privacy Policy | FNLCR

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Laboratory. The policy outlined below establishes how Frederick National Laboratory will use the information we gather about you from your visit to our website. We may coll

  18. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  19. EGRP Privacy Policy & Disclaimers

    Science.gov (United States)

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  20. Cybersecurity and Privacy

    DEFF Research Database (Denmark)

    he huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at the company and at individual level. Cybersecurity and Privacy – bridging the gap addresses....... Policies, frameworks, strategies, laws, tools, techniques, and technologies – all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject....... Technical topics discussed in the book include: Cybersecurity Encryption Privacy policy Trust Security and Internet of Things Botnets Data risks Cloud-based Services Visualization...

  1. National Privacy Research Strategy

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — On July 1, NITRD released the National Privacy Research Strategy. Research agencies across government participated in the development of the strategy, reviewing...

  2. Pole-zero form fractional model identification in frequency domain

    International Nuclear Information System (INIS)

    Mansouri, R.; Djamah, T.; Djennoune, S.; Bettayeb, M.

    2009-01-01

    This paper deals with system identification in the frequency domain using non integer order models given in the pole-zero form. The usual identification techniques cannot be used in this case because of the non integer orders of differentiation which makes the problem strongly nonlinear. A general identification method based on Levenberg-Marquardt algorithm is developed and allows to estimate the (2n+2m+1) parameters of the model. Its application to identify the ''skin effect'' of a squirrel cage induction machine modeling is then presented.

  3. Privacy of juridical bodies

    OpenAIRE

    Tiujo, Edson Mitsuo; CESUMAR

    2007-01-01

    According to art. 52 of the present Civil Code, juridical bodies may be titular to personality rights. The legal provision, however, has not defined what are personality rights attributable to juridical bodies, leaving the interpretation to the judges. Among personality rights, there is the right to privacy, which unfolds in other types such as the right to intimacy, to private life and to secrecy, from which juridical dobies have granted a privacy sphere (right to secrecy), from which third ...

  4. Certificate Transparency with Privacy

    Directory of Open Access Journals (Sweden)

    Eskandarian Saba

    2017-10-01

    Full Text Available Certificate transparency (CT is an elegant mechanism designed to detect when a certificate authority (CA has issued a certificate incorrectly. Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues. First, we develop a mechanism that enables web browsers to audit a CT log without violating user privacy. Second, we extend CT to support non-public subdomains.

  5. Reduced-form air quality modeling for community-scale ...

    Science.gov (United States)

    Transportation plays an important role in modern society, but its impact on air quality has been shown to have significant adverse effects on public health. Numerous reviews (HEI, CDC, WHO) summarizing findings of hundreds of studies conducted mainly in the last decade, conclude that exposures to traffic emissions near roads are a public health concern. The Community LINE Source Model (C-LINE) is a web-based model designed to inform the community user of local air quality impacts due to roadway vehicles in their region of interest using a simplified modeling approach. Reduced-form air quality modeling is a useful tool for examining what-if scenarios of changes in emissions, such as those due to changes in traffic volume, fleet mix, or vehicle speed. Examining various scenarios of air quality impacts in this way can identify potentially at-risk populations located near roadways, and the effects that a change in traffic activity may have on them. C-LINE computes dispersion of primary mobile source pollutants using meteorological conditions for the region of interest and computes air-quality concentrations corresponding to these selected conditions. C-LINE functionality has been expanded to model emissions from port-related activities (e.g. ships, trucks, cranes, etc.) in a reduced-form modeling system for local-scale near-port air quality analysis. This presentation describes the Community modeling tools C-LINE and C-PORT that are intended to be used by local gove

  6. Book Review: Asian Data Privacy Laws: Trade and Human Rights Perspectives

    Directory of Open Access Journals (Sweden)

    Sinta Dewi Rosadi

    2017-08-01

    Full Text Available This book is written by Professor Graham Greenleaf, an expert in the field of privacy law from Faculty of Law, University of New South Wales, Sydney, Australia. This book compiles his research and advocacy in Asia's privacy development since 1970, as well as his writings on Asian Privacy Development in Privacy Laws & Business International Report. This book is the result of his long collaboration with many privacy law experts from many States in Asia and has been published in numerous books and journals. The book is written because the author believes that privacy in its many forms is worth protecting as one of the rights protected under human rights laws. The author also believes that personal data has a high economic value, which leads to the book also examining the business aspects of the data privacy laws and the extent to which corporations take part in data privacy protection.

  7. Culture, Privacy Conception and Privacy Concern: Evidence from Europe before PRISM

    OpenAIRE

    Omrani, Nessrine; Soulié, Nicolas

    2017-01-01

    This article analyses individuals’ online privacy concerns between cultural country groups. We use a dataset of more than 14 000 Internet users collected by the European Union in 2010 in 26 EU countries. We use a probit model to examine the variables associated with the probability of being concerned about privacy, in order to draw policy and regulatory implications. The results show that women and poor people are more concerned than their counterparts. People who often use Internet are not p...

  8. Recommendations for the Sharing Economy: Safeguarding Privacy

    NARCIS (Netherlands)

    Ranzini, G.; Kusber, Nina; Vermeulen, I.E.; Etter, Michael

    2018-01-01

    his report, ‘Recommendations: Privacy’, forms one element of a European Union Horizon 2020 Research Project on the sharing economy: Ps2Share ‘Participation, Privacy, and Power in the Sharing Economy’. The study is undertaken within the scope of the European Union’s Horizon 2020 research and

  9. E-Commerce and Privacy: Conflict and Opportunity.

    Science.gov (United States)

    Farah, Badie N.; Higby, Mary A.

    2001-01-01

    Electronic commerce has intensified conflict between businesses' need to collect data and customers' desire to protect privacy. Web-based privacy tools and legislation could add to the costs of e-commerce and reduce profitability. Business models not based on profiling customers may be needed. (SK)

  10. LEA in Private: A Privacy and Data Protection Framework for a Learning Analytics Toolbox

    Science.gov (United States)

    Steiner, Christina M.; Kickmeier-Rust, Michael D.; Albert, Dietrich

    2016-01-01

    To find a balance between learning analytics research and individual privacy, learning analytics initiatives need to appropriately address ethical, privacy, and data protection issues. A range of general guidelines, model codes, and principles for handling ethical issues and for appropriate data and privacy protection are available, which may…

  11. Gain-Based Relief for Invasion of Privacy

    Directory of Open Access Journals (Sweden)

    Sirko Harder

    2013-11-01

    Full Text Available In many common law jurisdictions, some or all instances of invasion of privacy constitute a privacy-specific wrong either at common law (including equity or under statute. A remedy invariably available for such a wrong is compensation for loss. However, the plaintiff may instead seek to claim the profit the defendant has made from the invasion. This article examines when a plaintiff is, and should be, entitled to claim that profit, provided that invasion of privacy is actionable as such. After a brief overview of the relevant law in major common law jurisdictions, the article investigates how invasion of privacy fits into a general concept of what is called ‘restitution for wrongs’. It will be argued that the right to privacy is a right against the whole world and as such forms a proper basis of awarding gain-based relief for the unauthorised use of that right.

  12. Electrochemical Corrosion Studies for Modeling Metallic Waste Form Release Rates

    Energy Technology Data Exchange (ETDEWEB)

    Poineau, Frederic [Univ. of Nevada, Las Vegas, NV (United States); Tamalis, Dimitri [Florida Memorial Univ., Miami Gardens, FL (United States)

    2016-08-01

    The isotope 99Tc is an important fission product generated from nuclear power production. Because of its long half-life (t1/2 = 2.13 ∙ 105 years) and beta-radiotoxicity (β⁻ = 292 keV), it is a major concern in the long-term management of spent nuclear fuel. In the spent nuclear fuel, Tc is present as an alloy with Mo, Ru, Rh, and Pd called the epsilon-phase, the relative amount of which increases with fuel burn-up. In some separation schemes for spent nuclear fuel, Tc would be separated from the spent fuel and disposed of in a durable waste form. Technetium waste forms under consideration include metallic alloys, oxide ceramics and borosilicate glass. In the development of a metallic waste form, after separation from the spent fuel, Tc would be converted to the metal, incorporated into an alloy and the resulting waste form stored in a repository. Metallic alloys under consideration include Tc–Zr alloys, Tc–stainless steel alloys and Tc–Inconel alloys (Inconel is an alloy of Ni, Cr and iron which is resistant to corrosion). To predict the long-term behavior of the metallic Tc waste form, understanding the corrosion properties of Tc metal and Tc alloys in various chemical environments is needed, but efforts to model the behavior of Tc metallic alloys are limited. One parameter that should also be considered in predicting the long-term behavior of the Tc waste form is the ingrowth of stable Ru that occurs from the radioactive decay of 99Tc (99Tc → 99Ru + β⁻). After a geological period of time, significant amounts of Ru will be present in the Tc and may affect its corrosion properties. Studying the effect of Ru on the corrosion behavior of Tc is also of importance. In this context, we studied the electrochemical behavior of Tc metal, Tc-Ni alloys (to model Tc-Inconel alloy) and Tc-Ru alloys in acidic media. The study of Tc-U alloys has also been performed in order to better understand the

  13. supplier, tax and bank information form

    International Development Research Centre (IDRC) Digital Library (Canada)

    Hakan Mustafa

    General Principles of our Privacy Policy. IDRC is committed to protect the privacy of its suppliers' information. IDRC gathers specific personal information that you supply voluntarily in written form or by e-mail. Any personal information created, held or collected by IDRC is protected under the Canadian federal Privacy Act.

  14. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  15. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  16. 76 FR 59073 - Privacy Act

    Science.gov (United States)

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency...-1379. SUPPLEMENTARY INFORMATION: Consistent with the Privacy Act (PA), the CIA has undertaken and...

  17. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  18. Privacy in an Ambient World

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  19. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services.

    Science.gov (United States)

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.

  20. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  1. Squashed Toric Sigma Models and Mock Modular Forms

    Science.gov (United States)

    Gupta, Rajesh Kumar; Murthy, Sameer

    2018-01-01

    We study a class of two-dimensional N}=(2,2)} sigma models called squashed toric sigma models, using their Gauged Linear Sigma Models (GLSM) description. These models are obtained by gauging the global {U(1)} symmetries of toric GLSMs and introducing a set of corresponding compensator superfields. The geometry of the resulting vacuum manifold is a deformation of the corresponding toric manifold in which the torus fibration maintains a constant size in the interior of the manifold, thus producing a neck-like region. We compute the elliptic genus of these models, using localization, in the case when the unsquashed vacuum manifolds obey the Calabi-Yau condition. The elliptic genera have a non-holomorphic dependence on the modular parameter {τ} coming from the continuum produced by the neck. In the simplest case corresponding to squashed {C / Z_{2 the elliptic genus is a mixed mock Jacobi form which coincides with the elliptic genus of the {N=(2,2)} {SL(2,R) / U(1)} cigar coset.

  2. Calibrated and Interactive Modelling of Form-Active Hybrid Structures

    DEFF Research Database (Denmark)

    Quinn, Gregory; Holden Deleuran, Anders; Piker, Daniel

    2016-01-01

    at a fraction of the weight of traditional building elements and do so with a clear aesthetic expression of force flow and equilibrium. The design of FAHS is limited by one significant restriction: the geometry definition, form-finding and structural analysis are typically performed in separate and bespoke...... software packages which introduce interruptions and data exchange issues in the modelling pipeline. The mechanical precision, stability and open software architecture of Kangaroo has facilitated the development of proof-of-concept modelling pipelines which tackle this challenge and enable powerful...... materially-informed sketching. Making use of a projection-based dynamic relaxation solver for structural analysis, explorative design has proven to be highly effective....

  3. Privacy Analysis in Mobile Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio

    2012-01-01

    Nowadays, mobile social networks are capable of promoting social networking benefits during physical meetings, in order to leverage interpersonal affinities not only among acquaintances, but also between strangers. Due to their foundation on automated sharing of personal data in the physical...... factors: inquirer, purpose of disclosure, access & control of the disclosed information, location familiarity and current activity of the user. This research can serve as relevant input for the design of privacy management models in mobile social networks....... surroundings of the user, these networks are subject to crucial privacy threats. Privacy management systems must be capable of accurate selection of data disclosure according to human data sensitivity evaluation. Therefore, it is crucial to research and comprehend an individual's personal information...

  4. Privacy-Enhancing Auctions Using Rational Cryptography

    DEFF Research Database (Denmark)

    Miltersen, Peter Bro; Nielsen, Jesper Buus; Triandopoulos, Nikolaos

    2009-01-01

    We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, our assumption being that bidders primarily care about monetary payoff and secondarily worry about exposing information about...... their type to other players and learning information about other players’ types, that is, bidders are greedy then paranoid. To treat privacy explicitly within the game theoretic context, we put forward a novel hybrid utility model that considers both monetary and privacy components in players’ payoffs. We...... close to the original equilibrium.Supported by the Center for Algorithmic Game Theory, funded by The Carlsberg Foundation....

  5. Input point distribution for regular stem form spline modeling

    Directory of Open Access Journals (Sweden)

    Karel Kuželka

    2015-04-01

    Full Text Available Aim of study: To optimize an interpolation method and distribution of measured diameters to represent regular stem form of coniferous trees using a set of discrete points. Area of study: Central-Bohemian highlands, Czech Republic; a region that represents average stand conditions of production forests of Norway spruce (Picea abies [L.] Karst. in central Europe Material and methods: The accuracy of stem curves modeled using natural cubic splines from a set of measured diameters was evaluated for 85 closely measured stems of Norway spruce using five statistical indicators and compared to the accuracy of three additional models based on different spline types selected for their ability to represent stem curves. The optimal positions to measure diameters were identified using an aggregate objective function approach. Main results: The optimal positions of the input points vary depending on the properties of each spline type. If the optimal input points for each spline are used, then all spline types are able to give reasonable results with higher numbers of input points. The commonly used natural cubic spline was outperformed by other spline types. The lowest errors occur by interpolating the points using the Catmull-Rom spline, which gives accurate and unbiased volume estimates, even with only five input points. Research highlights: The study contributes to more accurate representation of stem form and therefore more accurate estimation of stem volume using data obtained from terrestrial imagery or other close-range remote sensing methods.

  6. Privacy Bridges: EU and US Privacy Experts In Search of Transatlantic Privacy Solutions

    NARCIS (Netherlands)

    Abramatic, J.-F.; Bellamy, B.; Callahan, M.E.; Cate, F.; van Eecke, P.; van Eijk, N.; Guild, E.; de Hert, P.; Hustinx, P.; Kuner, C.; Mulligan, D.; O'Connor, N.; Reidenberg, J.; Rubinstein, I.; Schaar, P.; Shadbolt, N.; Spiekermann, S.; Vladeck, D.; Weitzner, D.J.; Zuiderveen Borgesius, F.; Hagenauw, D.; Hijmans, H.

    2015-01-01

    The EU and US share a common commitment to privacy protection as a cornerstone of democracy. Following the Treaty of Lisbon, data privacy is a fundamental right that the European Union must proactively guarantee. In the United States, data privacy derives from constitutional protections in the

  7. The Privacy Jungle:On the Market for Data Protection in Social Networks

    Science.gov (United States)

    Bonneau, Joseph; Preibusch, Sören

    We have conducted the first thorough analysis of the market for privacy practices and policies in online social networks. From an evaluation of 45 social networking sites using 260 criteria we find that many popular assumptions regarding privacy and social networking need to be revisited when considering the entire ecosystem instead of only a handful of well-known sites. Contrary to the common perception of an oligopolistic market, we find evidence of vigorous competition for new users. Despite observing many poor security practices, there is evidence that social network providers are making efforts to implement privacy enhancing technologies with substantial diversity in the amount of privacy control offered. However, privacy is rarely used as a selling point, even then only as auxiliary, nondecisive feature. Sites also failed to promote their existing privacy controls within the site. We similarly found great diversity in the length and content of formal privacy policies, but found an opposite promotional trend: though almost all policies are not accessible to ordinary users due to obfuscating legal jargon, they conspicuously vaunt the sites' privacy practices. We conclude that the market for privacy in social networks is dysfunctional in that there is significant variation in sites' privacy controls, data collection requirements, and legal privacy policies, but this is not effectively conveyed to users. Our empirical findings motivate us to introduce the novel model of a privacy communication game, where the economically rational choice for a site operator is to make privacy control available to evade criticism from privacy fundamentalists, while hiding the privacy control interface and privacy policy to maximize sign-up numbers and encourage data sharing from the pragmatic majority of users.

  8. Technical Privacy Metrics: a Systematic Survey

    OpenAIRE

    Wagner, Isabel; Eckhoff, David

    2015-01-01

    The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics challenging. As a result, redundant new metrics are proposed frequently, and privacy studies are often incomparable. In this survey we allevia...

  9. Privacy-aware knowledge discovery novel applications and new techniques

    CERN Document Server

    Bonchi, Francesco

    2010-01-01

    Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and complexity of new forms of data. Renowned authorities from prominent organizations not only cover well-established results-they also explore complex domains where privacy issues are generally clear and well defined, but the solutions are still preliminary and in continuous development. Divided into seve

  10. Privacy Policy | FNLCR Staging

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  11. Two-nucleon transfer reactions with form factor models

    International Nuclear Information System (INIS)

    Osman, A.

    1980-04-01

    The theory of two-nucleon transfer reactions is considered. Nuclear reactions are considered with triton or 3 He particles which are used as projectiles in stripping reactions and as detected particles in pick-up reactions. In each channel we have a four-particle problem, three of them are nucleons and the fourth is a heavy particle. These transfer reactions are studied on the basis of the generaled R-matrix method. Different channel functions of the sub-clusters in the triton and 3 He particles are included. Model form factors are obtained and are used in two-nucleon transfer reactions. Differential cross-sections of different two-nucleon transfer reactions are calculated and are found in good agreement with the experimental data. The correct normalization and spectroscopic factors are obtained. (author)

  12. Hydrological Modeling of the Jezero Crater Outlet-Forming Flood

    Science.gov (United States)

    Fassett, Caleb I.; Goudge, Timothy A.

    2017-01-01

    Jezero crater is a site of prime scientific interest because it was a lake early in Mars history. Preserved clay- and carbonate-bearing sedimentary fans on Jezero's western and northwestern margin (Fig. 2) are accessible to future exploration. Geologic context [1] and stratigraphic analysis of the western fan strongly support the interpretation that these fans were deposited as deltas into the lake. This has helped establish Jezero as one of the final candidate landing sites for Mars 2020. The high level of certainty that Jezero was a lake results from the existence of its outlet valley, which required filling of the crater to form [e.g., 1,4]. Here, we specifically focus on how this outlet valley was carved by the dam breach flood that eroded the eastern crater rim. We have completed preliminary modeling in both 1D and 2D of the outlet's formation.

  13. Advances in Constitutive and Failure Models for Sheet Forming Simulation

    Science.gov (United States)

    Yoon, Jeong Whan; Stoughton, Thomas B.

    2016-08-01

    Non-Associated Flow Rule (Non-AFR) can be used as a convenient way to account for anisotropic material response in metal deformation processes, making it possible for example, to eliminate the problem of the anomalous yielding in equibiaxial tension that is mistakenly attributed to limitations of the quadratic yield function, but may instead be attributed to the Associated Flow Rule (AFR). Seeing as in Non-AFR based models two separate functions can be adopted for yield and plastic potential, there is no constraint to which models are used to describe each of them. In this work, the flexible combination of two different yield criteria as yield function and plastic potential under Non-AFR is proposed and evaluated. FE simulations were carried so as to verify the accuracy of the material directionalities predicted using these constitutive material models. The stability conditions for non-associated flow connected with the prediction of yield point elongation are also reviewed. Anisotropic distortion hardening is further incorporated under non-associated flow. It has been found that anisotropic hardening makes the noticeable improvements for both earing and spring-back predictions. This presentation is followed by a discussion of the topic of the forming limit & necking, the evidence in favor of stress analysis, and the motivation for the development of a new type of forming limit diagram based on the polar effective plastic strain (PEPS) diagram. In order to connect necking to fracture in metals, the stress-based necking limit is combined with a stress- based fracture criterion in the principal stress, which provides an efficient method for the analysis of necking and fracture limits. The concept for the PEPS diagram is further developed to cover the path-independent PEPS fracture which is compatible with the stress-based fracture approach. Thus this fracture criterion can be utilized to describe the post-necking behavior and to cover nonlinear strain-path. Fracture

  14. Trust-aware Privacy Control for Social Media

    OpenAIRE

    Li, Na; Najafian-Razavi, Maryam; Gillet, Denis

    2011-01-01

    Due to the huge exposure of personal information in social media, a challenge now is to design effective privacy mechanisms that protect against unauthorized access to social data. In this paper, a trust model for social media is first presented. Based on the trust model, a trust-aware privacy control protocol is proposed, that exploits the underlying inter-entity trust information. The objective is to design a fine-grained privacy scheme that ensures a user’s online information is disclosed ...

  15. Modeling corrosion and constituent release from a metal waste form

    International Nuclear Information System (INIS)

    Bauer, T. H.; Fink, J. K.; Abraham, D. P.; Johnson, I.; Johnson, S. G.; Wigeland, R. A.

    2000-01-01

    Several ANL ongoing experimental programs have measured metal waste form (MWF) corrosion and constituent release. Analysis of this data has initiated development of a consistent and quantitative phenomenology of uniform aqueous MWF corrosion. The effort so far has produced a preliminary fission product and actinide release model based on measured corrosion rates and calibrated by immersion test data for a 90 C J-13 and concentrated J-13 solution environment over 1-2 year exposure times. Ongoing immersion tests of irradiated and unirradiated MWF samples using more aggressive test conditions and improved tracking of actinides will serve to further validate, modify, and expand the application base of the preliminary model-including effects of other corrosion mechanisms. Sample examination using both mechanical and spectrographic techniques will better define both the nature and durability of the protective barrier layer. It is particularly important to assess whether the observations made with J-13 solution at 900 C persist under more aggressive conditions. For example, all the multiplicative factors in Table 1 implicitly assume the presence of protective barriers. Under sufficiently aggressive test conditions, such protective barriers may very well be altered or even eliminated

  16. Towards Territorial Privacy in Smart Environments

    NARCIS (Netherlands)

    Könings, Bastian; Schaub, Florian; Weber, M.; Kargl, Frank

    Territorial privacy is an old concept for privacy of the personal space dating back to the 19th century. Despite its former relevance, territorial privacy has been neglected in recent years, while privacy research and legislation mainly focused on the issue of information privacy. However, with the

  17. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may......The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...

  18. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    2007-01-01

    becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may......The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...

  19. Privacy Management and Networked PPD Systems - Challenges Solutions.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  20. BORDERS OF COMMUNICATION PRIVACY IN SLOVENIAN CRIMINAL PROCEDURE – CONSTITUTIONAL CHALLENGES

    Directory of Open Access Journals (Sweden)

    Sabina Zgaga

    2015-01-01

    Full Text Available Due to fast technological development and our constant communication protection of communication privacy in every aspect of our (legal life has become more important than ever before. Regarding protection of privacy in criminal procedure special emphasis should be given to the regulation of privacy in Slovenian Constitution and its interpretation in the case law of the Constitutional Court. This paper presents the definition of privacy and communication privacy in Slovenian constitutional law and exposes the main issues of communication privacy that have been discussed in the case law of the Constitutional Court in the last twenty years. Thereby the paper tries to show the general trend in the case law of Constitutional Court regarding the protection of communication privacy and to expose certain unsolved issues and unanswered challenges. Slovenian constitutional regulation of communication privacy is very protective, considering the broad definition of privacy and the strict conditions for encroachment of communication privacy. The case law of Slovenian Constitutional Court has also shown such trend, with the possible exception of the recent decision on a dynamic IP address. The importance of this decision is however significant, since it could be applicable to all forms of communication via internet, the prevailing form of communication nowadays. Certain challenges still lay ahead, such as the current proposal for the amendment of Criminal Procedure Act-M, which includes the use of IMSI catchers and numerous unanswered issues regarding data retention after the decisive annulment of its partial legal basis by the Constitutional Court.

  1. Performing privacy in schools

    DEFF Research Database (Denmark)

    Lauritsen, Peter; Bøge, Ask Risom; Andersen, Lars Bo

    In this presentation we pursue the question: How is privacy performed and perceived in schools by children? Our aim is to investigate how the boundaries between public and private spheres are continuously performed in the formal setting of the classroom as well as in the social lives of students...... with technologies is carried out as well as observation is conducted. We obtain and present new knowledge about how surveillance is practiced in the interpersonal relations of students and teachers. References: Monahan, T., & Torres, R. D. (2009). Schools Under Surveillance: Cultures of Control in Public Education....... School life involves a wide range of technologies, including smartphones, online communication platforms between teachers and parents, and social media. These and other surveillance-enabling services all contribute to the tracking of and by school children and shape their perceptions of privacy (Monahan...

  2. Mathematical modeling of drug release from lipid dosage forms.

    Science.gov (United States)

    Siepmann, J; Siepmann, F

    2011-10-10

    Lipid dosage forms provide an interesting potential for controlled drug delivery. In contrast to frequently used poly(ester) based devices for parenteral administration, they do not lead to acidification upon degradation and potential drug inactivation, especially in the case of protein drugs and other acid-labile active agents. The aim of this article is to give an overview on the current state of the art of mathematical modeling of drug release from this type of advanced drug delivery systems. Empirical and semi-empirical models are described as well as mechanistic theories, considering diffusional mass transport, potentially limited drug solubility and the leaching of other, water-soluble excipients into the surrounding bulk fluid. Various practical examples are given, including lipid microparticles, beads and implants, which can successfully be used to control the release of an incorporated drug during periods ranging from a few hours up to several years. The great benefit of mechanistic mathematical theories is the possibility to quantitatively predict the effects of different formulation parameters and device dimensions on the resulting drug release kinetics. Thus, in silico simulations can significantly speed up product optimization. This is particularly useful if long release periods (e.g., several months) are targeted, since experimental trial-and-error studies are highly time-consuming in these cases. In the future it would be highly desirable to combine mechanistic theories with the quantitative description of the drug fate in vivo, ideally including the pharmacodynamic efficacy of the treatments. Copyright © 2011 Elsevier B.V. All rights reserved.

  3. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  4. PRIVACY AS A CULTURAL PHENOMENON

    Directory of Open Access Journals (Sweden)

    Garfield Benjamin

    2017-07-01

    Full Text Available Privacy remains both contentious and ever more pertinent in contemporary society. Yet it persists as an ill-defined term, not only within specific fields but in its various uses and implications between and across technical, legal and political contexts. This article offers a new critical review of the history of privacy in terms of two dominant strands of thinking: freedom and property. These two conceptions of privacy can be seen as successive historical epochs brought together under digital technologies, yielding increasingly complex socio-technical dilemmas. By simplifying the taxonomy to its socio-cultural function, the article provides a generalisable, interdisciplinary approach to privacy. Drawing on new technologies, historical trends, sociological studies and political philosophy, the article presents a discussion of the value of privacy as a term, before proposing a defense of the term cyber security as a mode of scalable cognitive privacy that integrates the relative needs of individuals, governments and corporations.

  5. Gaussian operations and privacy

    International Nuclear Information System (INIS)

    Navascues, Miguel; Acin, Antonio

    2005-01-01

    We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states

  6. Perceived Speech Privacy in Computer Simulated Open-plan Offices

    DEFF Research Database (Denmark)

    Pop, Claudiu B.; Rindel, Jens Holger

    2005-01-01

    In open plan offices the lack of speech privacy between the workstations is one of the major acoustic problems. Improving the speech privacy in an open plan design is therefore the main concern for a successful open plan environment. The project described in this paper aimed to find an objective...... parameter that correlates well with the perceived degree of speech privacy and to derive a clear method for evaluating the acoustic conditions in open plan offices. Acoustic measurements were carried out in an open plan office, followed by data analysis at the Acoustic Department, DTU. A computer model...

  7. Location Privacy Techniques in Client-Server Architectures

    DEFF Research Database (Denmark)

    Jensen, Christian Søndergaard; Lu, Hua; Yiu, Man Lung

    2009-01-01

    A typical location-based service returns nearby points of interest in response to a user location. As such services are becoming increasingly available and popular, location privacy emerges as an important issue. In a system that does not offer location privacy, users must disclose their exact....... Third, their effectiveness is independent of the distribution of other users, unlike the k-anonymity approach. The chapter characterizes the privacy models assumed by existing techniques and categorizes these according to their approach. The techniques are then covered in turn according...

  8. The Challenges of Privacy by Design

    OpenAIRE

    Spiekermann-Hoff, Sarah

    2012-01-01

    Heralded by regulators, Privacy by Design holds the promise to solve the digital world's privacy problems. But there are immense challenges, including management commitment and step-by-step methods to integrate privacy into systems.

  9. Hydrological Modeling of the Jezero Crater Outlet-Forming Flood

    Science.gov (United States)

    Fassett, C. I.; Goudge, T. A.

    2017-01-01

    Abundant evidence exists for lakes on Mars both from orbital observations [e.g., 1-3] and in situ exploration [e.g., 4-5]. These lakes can be divided into two classes: those that were hydrologically closed, so their source valley(s) terminated at the basin [3], and those that were hydrologically open, where there was sufficient flow from inlet valley(s) to cause the lake to breach and form an outlet valley [2]. It is easier to be confident from orbital data alone that a standing body of water must have existed in open basins, because there is no other way for their perched outlet valleys to form. The majority of basins fed by valley networks, rather than by isolated inlet valleys, are open [6], with some important exceptions (e.g., Gale Crater). Jezero crater (Fig. 1) is one of the most well-studied open basin paleolakes on Mars, with a breach that re-mains well above the lowest part of the crater floor, and two sedimentary fans at its northwestern margin that are likely deltaic in origin [7-9]. CRISM observations of these sediments indicate they host a variety of alteration minerals [9-11], including smectite and carbonate, and both the mineralogy of the sediments and their settings suggest they have a strong potential for preserving organic materials [10]. As a result, Jezero is a strong candidate landing site for the Mars 2020 rover. Approximate formative discharges have been estimated for its well-preserved western fan (Q approximately 500m3/s) [7], but to our knowledge, no estimates for the dis-charges associated with formation and incision of its outlet valley have been presented. Indeed, only a few studies [e.g., 12-14] have attempted to reconstruct the formation of outlet breaches broadly similar to Jezero anywhere on Mars, despite the apparent commonality of basins with large outlets [e.g., 2]. The outlet valley formed as a dam breach when the lake overflowed. In such an event, the growth and incision of the breach is directly coupled to flood discharge

  10. Privacy vs. Reward in Indoor Location-Based Services

    Directory of Open Access Journals (Sweden)

    Fawaz Kassem

    2016-10-01

    Full Text Available With the advance of indoor localization technology, indoor location-based services (ILBS are gaining popularity. They, however, accompany privacy concerns. ILBS providers track the users’ mobility to learn more about their behavior, and then provide them with improved and personalized services. Our survey of 200 individuals highlighted their concerns about this tracking for potential leakage of their personal/private traits, but also showed their willingness to accept reduced tracking for improved service. In this paper, we propose PR-LBS (Privacy vs. Reward for Location-Based Service, a system that addresses these seemingly conflicting requirements by balancing the users’ privacy concerns and the benefits of sharing location information in indoor location tracking environments. PR-LBS relies on a novel location-privacy criterion to quantify the privacy risks pertaining to sharing indoor location information. It also employs a repeated play model to ensure that the received service is proportionate to the privacy risk. We implement and evaluate PR-LBS extensively with various real-world user mobility traces. Results show that PR-LBS has low overhead, protects the users’ privacy, and makes a good tradeoff between the quality of service for the users and the utility of shared location data for service providers.

  11. Form-finding of shell structures generated from physical models

    NARCIS (Netherlands)

    Li, Q.; Su, Y; Wu, Y; Borgart, A.; Rots, J.G.

    2017-01-01

    Vector form intrinsic finite element is a recently developed and promising numerical method for the analysis of complicated structural behavior. Taking the cable-link element as example, the framework of the vector form intrinsic finite element is explained first. Based on this, a constant strain

  12. Combining forming results via weld models to powerful numerical assemblies

    NARCIS (Netherlands)

    Kose, K.; Rietman, Bert

    2004-01-01

    Forming simulations generally give satisfying results with respect to thinning, stresses, changed material properties and, with a proper springback calculation, the geometric form. The joining of parts by means of welding yields an extra change of the material properties and the residual stresses.

  13. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    by taking the distributed structure of the system into account and improving the efficiency in terms of computation and communication by data packing. While our construction can be easily adjusted to a centralized or a distributed computing model, we rely on a set of particular users that help the service...... for distributed clustering that limits information leakage to the untrusted service provider that performs the clustering. To achieve this goal, we rely on cryptographic techniques, in particular homomorphic encryption, and further improve the state of the art of processing encrypted data in terms of efficiency...... provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner....

  14. Deriving a Set of Privacy Specific Heuristics for the Assessment of PHRs (Personal Health Records).

    Science.gov (United States)

    Furano, Riccardo F; Kushniruk, Andre; Barnett, Jeff

    2017-01-01

    With the emergence of personal health record (PHR) platforms becoming more widely available, this research focused on the development of privacy heuristics to assess PHRs regarding privacy. Existing sets of heuristics are typically not application specific and do not address patient-centric privacy as a main concern prior to undergoing PHR procurement. A set of privacy specific heuristics were developed based on a scoping review of the literature. An internet-based commercially available, vendor specific PHR application was evaluated using the derived set of privacy specific heuristics. The proposed set of privacy specific derived heuristics is explored in detail in relation to ISO 29100. The assessment of the internet-based commercially available, vendor specific PHR application indicated numerous violations. These violations were noted within the study. It is argued that the new derived privacy heuristics should be used in addition to Nielsen's well-established set of heuristics. Privacy specific heuristics could be used to assess PHR portal system-level privacy mechanisms in the procurement process of a PHR application and may prove to be a beneficial form of assessment to prevent the selection of a PHR platform with a poor privacy specific interface design.

  15. Privacy preserving interactive record linkage (PPIRL).

    Science.gov (United States)

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human-machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human-machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility.

  16. 78 FR 73466 - Privacy Act

    Science.gov (United States)

    2013-12-06

    ... OVERSEAS PRIVATE INVESTMENT CORPORATION 22 CFR Part 707 [No. PA-2013] Privacy Act AGENCY: Overseas... revisions to the Overseas Private Investment Corporation's (``OPIC'') Privacy Act (``PA'') regulations by... Flexibility Act (5 U.S.C. 601 et seq.) Pursuant to the Regulatory Flexibility Act, 5 U.S.C. 601 et seq., the...

  17. Story Lab: Student Data Privacy

    Science.gov (United States)

    Herold, Benjamin

    2015-01-01

    Student data privacy is an increasingly high-profile--and controversial--issue that touches schools and families across the country. There are stories to tell in virtually every community. About three dozen states have passed legislation addressing student data privacy in the past two years, and eight different proposals were floating around…

  18. Privacy and Big Data

    CERN Document Server

    Craig, Terence

    2011-01-01

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today-truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Pri

  19. Where do cities form? A geographical agglomeration model for Europe

    NARCIS (Netherlands)

    Stelder, T.M.

    2005-01-01

    In the recent literature on spatial agglomeration models, substantial progress has been made in modeling urban structures in terms of number and size of cities, but the question where cities arise remains unanswered. This paper illustrates that if a spatial agglomeration model is extended with a

  20. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  1. GAIN RATIO BASED FEATURE SELECTION METHOD FOR PRIVACY PRESERVATION

    Directory of Open Access Journals (Sweden)

    R. Praveena Priyadarsini

    2011-04-01

    Full Text Available Privacy-preservation is a step in data mining that tries to safeguard sensitive information from unsanctioned disclosure and hence protecting individual data records and their privacy. There are various privacy preservation techniques like k-anonymity, l-diversity and t-closeness and data perturbation. In this paper k-anonymity privacy protection technique is applied to high dimensional datasets like adult and census. since, both the data sets are high dimensional, feature subset selection method like Gain Ratio is applied and the attributes of the datasets are ranked and low ranking attributes are filtered to form new reduced data subsets. K-anonymization privacy preservation technique is then applied on reduced datasets. The accuracy of the privacy preserved reduced datasets and the original datasets are compared for their accuracy on the two functionalities of data mining namely classification and clustering using naïve Bayesian and k-means algorithm respectively. Experimental results show that classification and clustering accuracy are comparatively the same for reduced k-anonym zed datasets and the original data sets.

  2. Protecting the Privacy and Security of Your Health Information

    Science.gov (United States)

    ... About ONC Main navigation Health IT Feedback Form Health IT Strategic Planning Leadership Bios ONC Speaker Request Form Contact Us ONC Budget and Performance Breadcrumb Home How Do I? For ... How can I access my health information/medical record? Protecting Your Privacy & Security Protecting ...

  3. Modelling of failure in sheet forming using cohesive elements

    NARCIS (Netherlands)

    Wisselink, H.H.; Huetink, Han; Khalili, N; Valliappan, S; Li, Q; Russell, A

    2010-01-01

    Introduction: Shell elements are the most efficient method for large scale simulations of sheet metal forming or deformation of sheet products. These elements have a limited description of the kinematics. This is normally a good approximation of the real deformation, but it cannot describe the

  4. Multi-scale friction modeling for sheet metal forming

    NARCIS (Netherlands)

    Hol, J.

    2013-01-01

    Finite element (FE) formability analyses are everyday practice in the metal-forming industry to reduce costs and lead time of new metal products. Although the predictive capabilities of FE software codes have improved significantly over the years, unfortunately, the experimental trial-and-error

  5. Composing security protocols: from confidentiality to privacy

    OpenAIRE

    Arapinis, Myrto; Cheval, Vincent; Delaune, Stéphanie

    2015-01-01

    Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose several results to safely compose security protocols. We consider arbitrary primitives modeled using an equational theory, and a rich process algebra close to the applied pi calculus. Relying on these composi...

  6. New Collaborative Filtering Algorithms Based on SVD++ and Differential Privacy

    Directory of Open Access Journals (Sweden)

    Zhengzheng Xian

    2017-01-01

    Full Text Available Collaborative filtering technology has been widely used in the recommender system, and its implementation is supported by the large amount of real and reliable user data from the big-data era. However, with the increase of the users’ information-security awareness, these data are reduced or the quality of the data becomes worse. Singular Value Decomposition (SVD is one of the common matrix factorization methods used in collaborative filtering, which introduces the bias information of users and items and is realized by using algebraic feature extraction. The derivative model SVD++ of SVD achieves better predictive accuracy due to the addition of implicit feedback information. Differential privacy is defined very strictly and can be proved, which has become an effective measure to solve the problem of attackers indirectly deducing the personal privacy information by using background knowledge. In this paper, differential privacy is applied to the SVD++ model through three approaches: gradient perturbation, objective-function perturbation, and output perturbation. Through theoretical derivation and experimental verification, the new algorithms proposed can better protect the privacy of the original data on the basis of ensuring the predictive accuracy. In addition, an effective scheme is given that can measure the privacy protection strength and predictive accuracy, and a reasonable range for selection of the differential privacy parameter is provided.

  7. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  8. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  9. Children and Their Digital Dossiers: Lessons in Privacy Rights in the Digital Age

    Science.gov (United States)

    Berson, Ilene R.; Berson, Michael J.

    2006-01-01

    The right to privacy is a firmly entrenched democratic principle that has been inferred in the U.S. Constitution and protected by the Fourteenth Amendment as a liberty of personal autonomy. It is the statutory right to privacy that has been most closely aligned with data protection as a form of self-protection. The U.S. Federal Trade Commission…

  10. Numerical Modelling of Drawbeads for Forming of Aluminium Alloys

    DEFF Research Database (Denmark)

    Joshi, Y; Christiansen, Peter; Masters, I

    2016-01-01

    from different semi-circular drawbead geometries commonly encountered in automotive dies and compares them to those obtained from Stoughton’s analytical drawbead model and the 2D plane strain drawbead model set up using LS-DYNA.The study was conducted on lubricated NG5754 strips. The results presented...

  11. Bayesian analysis of a reduced-form air quality model.

    Science.gov (United States)

    Foley, Kristen M; Reich, Brian J; Napelenok, Sergey L

    2012-07-17

    Numerical air quality models are being used for assessing emission control strategies for improving ambient pollution levels across the globe. This paper applies probabilistic modeling to evaluate the effectiveness of emission reduction scenarios aimed at lowering ground-level ozone concentrations. A Bayesian hierarchical model is used to combine air quality model output and monitoring data in order to characterize the impact of emissions reductions while accounting for different degrees of uncertainty in the modeled emissions inputs. The probabilistic model predictions are weighted based on population density in order to better quantify the societal benefits/disbenefits of four hypothetical emission reduction scenarios in which domain-wide NO(x) emissions from various sectors are reduced individually and then simultaneously. Cross validation analysis shows the statistical model performs well compared to observed ozone levels. Accounting for the variability and uncertainty in the emissions and atmospheric systems being modeled is shown to impact how emission reduction scenarios would be ranked, compared to standard methodology.

  12. Comparisons of friction models in bulk metal forming

    DEFF Research Database (Denmark)

    Tan, Xincai

    2002-01-01

    A friction model is one of the key input boundary conditions in finite element simulations. It is said that the friction model plays an important role in controlling the accuracy of necessary output results predicted. Among the various friction models, which one is of higher accuracy is still...... unknown and controversial. In this paper, finite element analyses applying five different friction models to experiments of upsetting of AA 6082 lubricated with four lubricants are presented. Frictional parameter values are determined by fitness of data of friction area ratio from finite element analysis...... to experimental results. It is found that calibration curves of the friction area ratio for all of the five chosen friction models used in the finite element simulation do fit the experimental results. Usually, calbration curves of the friction area ratio are more sensitive to friction at the tool...

  13. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  14. Trust information-based privacy architecture for ubiquitous health.

    Science.gov (United States)

    Ruotsalainen, Pekka Sakari; Blobel, Bernd; Seppälä, Antto; Nykänen, Pirkko

    2013-10-08

    Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system

  15. Prior Negative Experience, Online Privacy Concerns and Intent to Disclose Personal Information in Chinese Social Media

    OpenAIRE

    Hongwei “Chris†Yang

    2014-01-01

    A paper survey of 489 Chinese college students was conducted in spring, 2012 to test a conceptual model of online information disclosure in social media. It shows that young Chinese SNS users' prior negative experience of online disclosure significantly increased their online privacy concerns and their perceived risk. Their online privacy concerns undermined their trust of online companies, marketers and laws to protect privacy and elevated their perceived risk. Their trust strongly predicted...

  16. Indoor Air Quality Building Education and Assessment Model Forms

    Science.gov (United States)

    The Indoor Air Quality Building Education and Assessment Model (I-BEAM) is a guidance tool designed for use by building professionals and others interested in indoor air quality in commercial buildings.

  17. Irreducible integrable theories form tensor products of conformal models

    International Nuclear Information System (INIS)

    Mathur, S.D.; Warner, N.P.

    1991-01-01

    By using Toda field theories we show that there are perturbations of direct products of conformal theories that lead to irreducible integrable field theories. The same affine Toda theory can be truncated to different quantum integrable models for different choices of the charge at infinity and the coupling. The classification of integrable models that can be obtained in this fashion follows the classification of symmetric spaces of type G/H with rank H = rank G. (orig.)

  18. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  19. A Design Oriented Model of Plate Forming for Shipbbuilding

    Science.gov (United States)

    1989-09-01

    C.A. Queener and R.J. DeAngelis, “Elastic Springback and Residual Stresses In Sheet Metal Formed By Bending”, Trans. of ASM, 61, 1968. K.A. Stelson...parameters of material 18.2 The geometry of the bending process is simple three point beam bending as shown in Fig- ure 4. As the punch penetrates into...simple beam theory and pure moment bending. Although the influence of large deflec- tions and transverse shear is important, it is as- sumed herein that

  20. Migration modelling of different plutonium chemical forms through porous media

    International Nuclear Information System (INIS)

    Saltelli, A.

    1979-01-01

    Two solutions of the migration equations are described. The first relates to the transport equations for the decay chain Am 243→Pu 239→U 235. Numerical integration was performed in this case by a simulation code written in CSMP III language and plutonium is considered to be all in the same chemical form. The second case relates to the problem of Pu speciation and migration. The decay chain Pu 240→U 236 is considered and numerical integration is performed by a modified version of Bo code COLUMN. Pseudo first order reactions are supposed to act between Pu states to maintain equilibrium during the migration

  1. Attribute association based privacy preservation for multi trust level ...

    Indian Academy of Sciences (India)

    The two adversarial models in Secure Multi party Computation (SMC) with semi honest and malicious ... model that gives a analytical cost model that helps the health information custodians to take decision while sharing ...... Privacy Persevering Data Mining Models and Algorithms, Springer science + Business media, LLC.

  2. Redefining genomic privacy: trust and empowerment.

    Directory of Open Access Journals (Sweden)

    Yaniv Erlich

    2014-11-01

    Full Text Available Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we introduce three principles that facilitate trust in genetic research and outline one possible framework built upon those principles. Our hope is that such trust-centric frameworks provide a sustainable solution that reconciles genetic privacy with data sharing and facilitates genetic research.

  3. Probabilistic Seismic Performance Model for Tunnel Form Concrete Building Structures

    Directory of Open Access Journals (Sweden)

    S. Bahram Beheshti Aval

    2016-12-01

    Full Text Available Despite widespread construction of mass-production houses with tunnel form structural system across the world, unfortunately no special seismic code is published for design of this type of construction. Through a literature survey, only a few studies are about the seismic behavior of this type of structural system. Thus based on reasonable numerical results, the seismic performance of structures constructed with this technique considering the effective factors on structural behavior is highly noteworthy in a seismic code development process. In addition, due to newness of this system and observed damages in past earthquakes, and especially random nature of future earthquakes, the importance of probabilistic approach and necessity of developing fragility curves in a next generation Performance Based Earthquake Engineering (PBEE frame work are important. In this study, the seismic behavior of 2, 5 and 10 story tunnel form structures with a regular plan is examined. First, the performance levels of these structures under the design earthquake (return period of 475 years with time history analysis and pushover method are assessed, and then through incremental dynamic analysis, fragility curves are extracted for different levels of damage in walls and spandrels. The results indicated that the case study structures have high capacity and strength and show appropriate seismic performance. Moreover, all three structures subjected were in immediate occupancy performance level.

  4. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...

  5. Friction Modelling In Connection With Cold Forming Processes

    DEFF Research Database (Denmark)

    Tan, Xincai

    is first coated with aluminate conversion coatings and then lubricated by alkaline soap, molybdenum disulphide (MoS2), alkaline soap followed by molykote grease paste, or kerosene respectively. Steel and stainless steel are first coated with zinc phosphate coatings and then lubricated by either alkaline...... soap or molybdenum disulphide. As processes testing friction sensitive flow, the ring-compression tests and the double cup extrusion tests are carried out. An absolute constant friction model has been proposed to separate the influence of strain hardening from friction. This model has been applied...

  6. A secure data privacy preservation for on-demand

    Directory of Open Access Journals (Sweden)

    Dhasarathan Chandramohan

    2017-04-01

    Full Text Available This paper spotlights privacy and its obfuscation issues of intellectual, confidential information owned by insurance and finance sectors. Privacy risk in business era if authoritarians misuse secret information. Software interruptions in steeling digital data in the name of third party services. Liability in digital secrecy for the business continuity isolation, mishandling causing privacy breaching the vicinity and its preventive phenomenon is scrupulous in the cloud, where a huge amount of data is stored and maintained enormously. In this developing IT-world toward cloud, users privacy protection is becoming a big question , albeit cloud computing made changes in the computing field by increasing its effectiveness, efficiency and optimization of the service environment etc, cloud users data and their identity, reliability, maintainability and privacy may vary for different CPs (cloud providers. CP ensures that the user’s proprietary information is maintained more secretly with current technologies. More remarkable occurrence is even the cloud provider does not have suggestions regarding the information and the digital data stored and maintained globally anywhere in the cloud. The proposed system is one of the obligatory research issues in cloud computing. We came forward by proposing the Privacy Preserving Model to Prevent Digital Data Loss in the Cloud (PPM–DDLC. This proposal helps the CR (cloud requester/users to trust their proprietary information and data stored in the cloud.

  7. Modelling Stochastic Route Choice Behaviours with a Closed-Form Mixed Logit Model

    Directory of Open Access Journals (Sweden)

    Xinjun Lai

    2015-01-01

    Full Text Available A closed-form mixed Logit approach is proposed to model the stochastic route choice behaviours. It combines both the advantages of Probit and Logit to provide a flexible form in alternatives correlation and a tractable form in expression; besides, the heterogeneity in alternative variance can also be addressed. Paths are compared by pairs where the superiority of the binary Probit can be fully used. The Probit-based aggregation is also used for a nested Logit structure. Case studies on both numerical and empirical examples demonstrate that the new method is valid and practical. This paper thus provides an operational solution to incorporate the normal distribution in route choice with an analytical expression.

  8. A Computer Model of Simple Forms of Learning.

    Science.gov (United States)

    Jones, Thomas L.

    A basic unsolved problem in science is that of understanding learning, the process by which people and machines use their experience in a situation to guide future action in similar situations. The ideas of Piaget, Pavlov, Hull, and other learning theorists, as well as previous heuristic programing models of human intelligence, stimulated this…

  9. Lunar-Forming Giant Impact Model Utilizing Modern Graphics ...

    Indian Academy of Sciences (India)

    2016-01-27

    Jan 27, 2016 ... Recent giant impact models focus on producing a circumplanetary disk of the proper composition around the Earth and defer to earlier works for the accretion of this disk into the Moon. The discontinuity between creating the circumplanetary disk and accretion of the Moon is unnatural and lacks simplicity.

  10. Finite Element Modelling of Cold Formed Stainless Steel Columns

    Directory of Open Access Journals (Sweden)

    M. Macdonald

    2005-01-01

    Full Text Available This paper describes the results obtained from a finite element investigation into the load capacity of column members of lipped channel cross-section, cold formed from Type 304 stainless steel, subjected to concentric and eccentric compression loading. The main aims of this investigation were to determine the effects which the non-linearity of the stress-strain behaviour of the material would have on the column behaviour under concentric or eccentric loading. Stress-strain curves derived from tests and design codes are incorporated into non-linear finite element analyses of eccentrically loaded columns and the results obtained are compared with those obtained on the basis of experiments on stainless steel channel columns with the same properties and dimensions. Comparisons of the finite element results and the test results are also made with existing design specifications and conclusions are drawn on the basis of the comparisons. 

  11. The Privacy Calculus: Mobile Apps and User Perceptions of Privacy and Security

    Directory of Open Access Journals (Sweden)

    Elizabeth Fife

    2012-07-01

    Full Text Available A continuing stream of new mobile data services are being released that rely upon the collection of personal data to support a business model. New technologies including facial recognition, sensors and Near Field Communications (NFC will increasingly become a part of everyday services and applications that challenge traditional concepts of individual privacy. The average person as well as the “tech‐savvy” mobile phone user may not yet be fully aware of the extent to which their privacy and security are being affected through their mobile activities and how comparable this situation is to personal computer usage. We investigate perceptions and usage of mobile data services that appear to have specific privacy and security sensitivities, specifically social networking,\tbanking/payments\tand\thealth‐related activities. Our annual survey of smartphone users in the U.S. and Japan is presented from 2011. This nationally representative survey data is used to show demographic and cultural differences, and substantiate our hypotheses about the links between use and privacy concerns

  12. Physical factors that influence patients’ privacy perception toward a psychiatric behavioral monitoring system: a qualitative study

    Science.gov (United States)

    Zakaria, Nasriah; Ramli, Rusyaizila

    2018-01-01

    Background Psychiatric patients have privacy concerns when it comes to technology intervention in the hospital setting. In this paper, we present scenarios for psychiatric behavioral monitoring systems to be placed in psychiatric wards to understand patients’ perception regarding privacy. Psychiatric behavioral monitoring refers to systems that are deemed useful in measuring clinical outcomes, but little research has been done on how these systems will impact patients’ privacy. Methods We conducted a case study in one teaching hospital in Malaysia. We investigated the physical factors that influence patients’ perceived privacy with respect to a psychiatric monitoring system. The eight physical factors identified from the information system development privacy model, a comprehensive model for designing a privacy-sensitive information system, were adapted in this research. Scenario-based interviews were conducted with 25 patients in a psychiatric ward for 3 months. Results Psychiatric patients were able to share how physical factors influence their perception of privacy. Results show how patients responded to each of these dimensions in the context of a psychiatric behavioral monitoring system. Conclusion Some subfactors under physical privacy are modified to reflect the data obtained in the interviews. We were able to capture the different physical factors that influence patient privacy. PMID:29343963

  13. Generalized Heteroskedasticity ACF for Moving Average Models in Explicit Forms

    Directory of Open Access Journals (Sweden)

    Samir Khaled Safi

    2014-02-01

    Full Text Available Normal 0 false false false MicrosoftInternetExplorer4 The autocorrelation function (ACF measures the correlation between observations at different   distances apart. We derive explicit equations for generalized heteroskedasticity ACF for moving average of order q, MA(q. We consider two cases: Firstly: when the disturbance term follow the general covariance matrix structure Cov(wi, wj=S with si,j ¹ 0 " i¹j . Secondly: when the diagonal elements of S are not all identical but sij = 0 " i¹j, i.e. S=diag(s11, s22,…,stt. The forms of the explicit equations depend essentially on the moving average coefficients and covariance structure of the disturbance terms.   /* Style Definitions */ table.MsoNormalTable {mso-style-name:"جدول عادي"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;}

  14. Privacy Impact Assessment (PIA) Repository

    Data.gov (United States)

    Department of Veterans Affairs — This repository contains Privacy Impact Assessments (PIA) that have been vetted/approved. Section 208 of the Electronic Government Act of 2002 (E-Gov Act) requires...

  15. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  16. String model for the dynamics of glass-forming liquids.

    Science.gov (United States)

    Pazmiño Betancourt, Beatriz A; Douglas, Jack F; Starr, Francis W

    2014-05-28

    We test the applicability of a living polymerization theory to describe cooperative string-like particle rearrangement clusters (strings) observed in simulations of a coarse-grained polymer melt. The theory quantitatively describes the interrelation between the average string length L, configurational entropy Sconf, and the order parameter for string assembly Φ without free parameters. Combining this theory with the Adam-Gibbs model allows us to predict the relaxation time τ in a lower temperature T range than accessible by current simulations. In particular, the combined theories suggest a return to Arrhenius behavior near Tg and a low T residual entropy, thus avoiding a Kauzmann "entropy crisis."

  17. Multi-Scalar Modelling for Free-form Timber Structures

    DEFF Research Database (Denmark)

    Poinet, Paul; Nicholas, Paul; Tamke, Martin

    2016-01-01

    in the segmentation strategy of glue-laminated timber structures that depend on structural requirements and the different types of constraints related to fabrication, transportation and assembly. Where current working practices decouple segmentation processes within a discrete digital workflow, this research aims...... to integrate and negotiate the different parameters that drive the same segmentation strategy within a continuous environment. The research is developed in close collaboration with two industry partners – Buro Happold and DesignToProduction – and focuses on the implementation of Multi-Scalar Modelling concepts...

  18. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  19. A unified spray forming model for the prediction of billet shape geometry

    DEFF Research Database (Denmark)

    Hattel, Jesper; Pryds, Nini

    2004-01-01

    In the present work a unified model for simulating the spray forming process has been developed. Models for the atomization and the deposition processes have been coupled together in order to obtain a new unified description of the spray forming process. The model is able to predict the shape and...

  20. Factors and Predictors of Online Security and Privacy Behavior

    Directory of Open Access Journals (Sweden)

    Goran Bubaš

    2008-12-01

    Full Text Available Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT skills that investigated how assumptions and habits of Internet users are related to their online security and privacy. The following four factors of online security and privacy related behaviors were revealed in factor analysis: F1 – conscientiousness in the maintenance of the operating system, upgrading of the Internet browser and use of antivirus and antispyware programs; F2 –engagement in risky and careless online activities with lack of concern for personal online privacy; F3 – disbelief that privacy violations and security threats represent possible problems; F4 – lack of fear regarding potential privacy and security threats with no need for change in personal online behavior. Statistically significant correlations were found between some of the discovered factors on the one side, and criteria variables occurrence of malicious code (C1 and data loss on the home computer (C2 on the other. In addition, a regression analysis was performed which revealed that the potentially risky online behaviors of Internet users were associated with the two criteria variables. To properly interpret the results of correlation and regression analyses a conceptual model was developed of the potential causal relationships between the behavior of Internet users and their experiences with online security threats. An additional study was also performed which partly confirmed the conceptual model, as well as the factors of online security and privacy related behaviors.

  1. Interactive and Lightweight Mechanisms to Coordinate Interpersonal Privacy in Mediated Communication

    Science.gov (United States)

    Romero, Natalia; Boer, Laurens; Markopoulos, Panos

    In this paper we describe three mechanisms that enable people to coordinate their interaction needs with others in their social network. The proposed designs are based on the Privacy Grounding Model [4] that argues the need for lightweight and interactive coordination mechanisms to support the dynamic and dialectic nature of interpersonal privacy coordination.

  2. A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes

    NARCIS (Netherlands)

    Tang, Qiang; Bringer, Julien; Chabanne, Hervé; Pointcheval, David; Chen, L.; Mu, Y.; Susilo, W.

    With their increasing popularity in cryptosystems, biometrics have attracted more and more attention from the information security community. However, how to handle the relevant privacy concerns remains to be troublesome. In this paper, we propose a novel security model to formalize the privacy

  3. European Perspectives on Privacy in the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Etter, Michael; Vermeulen, Ivar

    Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy. This report ‘European Perspectives on Privacy in the Sharing Economy’ forms one element of a European Union Horizon 2020 Research Project on the sharing economy: Ps2Share ‘Participation......, Privacy, and Power in the Sharing Economy’. The study is undertaken within the scope of the European Union’s Horizon 2020 research and innovation programme, funded under grant agreement No. 732117 and with the objective (ICT-35) of “Enabling responsible ICT-related research and innovation”. This project...... aims to foster better awareness of the consequences which the sharing economy has on the way people behave, think, interact, and socialize across Europe. Our overarching objective is to identify key challenges of the sharing economy and improve Europe’s digital services through providing...

  4. Privacy in the Genomic Era

    Science.gov (United States)

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  5. Privacy in the Genomic Era.

    Science.gov (United States)

    Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W; Fellay, Jacques; Gunter, Carl A; Hubaux, Jean-Pierre; Malin, Bradley A; Wang, Xiaofeng

    2015-09-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.

  6. Security and Privacy in Video Surveillance: Requirements and Challenges

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2014-01-01

    observed by the system. Several techniques to protect the privacy of individuals have therefore been proposed, but very little research work has focused on the specific security requirements of video surveillance data (in transit or in storage) and on authorizing access to this data. In this paper, we...... present a general model of video surveillance systems that will help identify the major security and privacy requirements for a video surveillance system and we use this model to identify practical challenges in ensuring the security of video surveillance data in all stages (in transit and at rest). Our......Use of video surveillance has substantially increased in the last few decades. Modern video surveillance systems are equipped with techniques that allow traversal of data in an effective and efficient manner, giving massive powers to operators and potentially compromising the privacy of anyone...

  7. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-091)] Privacy Act of 1974; Privacy Act...: Revisions of NASA Appendices to Privacy Act System of Records. SUMMARY: Notice is hereby given that NASA is... Privacy Act of 1974. This notice publishes those amendments as set forth below under the caption...

  8. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-07-05

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-071] Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Each Federal agency is required by the Privacy Act of 1974 to publish...

  9. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  10. 12 CFR Appendix C to Part 571 - Model Forms for Opt-Out Notices

    Science.gov (United States)

    2010-01-01

    ...-Affiliate Notice) C-4Model Form for Renewal Notice (Joint Notice) C-5Model Form for Voluntary “No Marketing... (Single-Affiliate Notice)—[Your Choice To Limit Marketing]/[Marketing Opt-out] • [Name of Affiliate] is... limit marketing from our affiliates.] • You may limit our affiliates in the [ABC] group of companies...

  11. CARAVAN: Providing Location Privacy for VANET

    National Research Council Canada - National Science Library

    Sampigethaya, Krishna; Huang, Leping; Li, Mingyan; Poovendran, Radha; Matsuura, Kanta; Sezaki, Kaoru

    2005-01-01

    .... This type of tracking leads to threats on the location privacy of the vehicle's user. In this paper, we study the problem of providing location privacy in VANET by allowing vehicles to prevent tracking of their broadcast communications...

  12. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  13. Separating form factor and nuclear model effects in quasielastic neutrino-nucleus scattering

    Science.gov (United States)

    Wieske, Joseph

    2017-09-01

    When studying neutrino oscillations an understanding of charged current quasielastic (CCQE) neutrino-nucleus scattering is imperative. This interaction depends on a nuclear model as well as knowledge of form factors. In the past, CCQE data from the MiniBooNE experiment was analyzed assuming the Relativistic Fermi Gas (RFG) nuclear model, an axial dipole form factor in, and using the the z-expansion for the axial form factor in. We present the first analysis that combines a non-RFG nuclear model, in particular the Correlated Fermi Gas nuclear model (CFG) of, and the z expansion for the axial form factor. This will allow us to separate form factor and nuclear model effects in CCQE scattering. This project was supported through the Wayne State University REU program under NSF Grant PHY-1460853 and by the DOE Grant DE-SC0007983.

  14. Multi-scale friction modeling for sheet metal forming: the mixed lubrication regime

    NARCIS (Netherlands)

    Hol, J.; Meinders, Vincent T.; Geijselaers, Hubertus J.M.; van den Boogaard, Antonius H.

    2015-01-01

    A mixed lubrication friction model is presented to accurately account for friction in sheet metal forming FE sim-ulations. The advanced friction model comprises a coupling between a hydrodynamic friction model and a boundary lubrication friction model, based on the lubricant film thickness. Mixed

  15. CLOSED FORM MODELING OF CROSSTALK FOR DISTRIBUTED RLCG ON-CHIP INTERCONNECTS USING DIFFERENCE MODEL APPROACH

    Directory of Open Access Journals (Sweden)

    Rajib Kar

    2010-03-01

    proposes a difference model approach to derive crosstalk in the transform domain. A closed form solution for crosstalk is obtained by incorporating initial conditions using difference model approach for distributed RLCG interconnects. We have proposed an explicit expression for the estimation of cross-talk noise. Our model considers both lossless components (i.e. L, C and lossy components (i.e. R, G. The SPICE simulation justifies the accuracy of our proposed approach.

  16. Development of an interfacial model for forming of a metal-composite material system

    Science.gov (United States)

    Kalyanasundaram, Shankar; Compston, Paul; Mosse, Luke

    2013-12-01

    This work presents a finite element model for the stamp forming simulation of Fiber-Metal laminate system consisting of glass fiber reinforced composite material layer sandwiched between two aluminium layers. A novel interfacial model was developed to analyze the role of the interface between the metal and composite layers. A one way coupled thermo mechanical model was used to study the effect of pre heating the material system to improve the formability. Comparison between the simulation and experiments were carried out for forming of rectangular cups. The results indicate that the interfacial model is effective in predicting the forming behavior of this advanced light weight material system.

  17. Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains

    Directory of Open Access Journals (Sweden)

    Xunjun Chen

    2015-06-01

    Full Text Available One of the major applications of Radio Frequency Identification (RFID technology is in supply chain management as it promises to provide real-time visibility based on the function of track and trace. However, such an RFID-based track and trace system raises new security and privacy challenges due to the restricted resource of tags. In this paper, we refine three privacy related models (i.e., the privacy, path unlinkability, and tag unlinkability of RFID-based track and trace systems, and clarify the relations among these privacy models. Specifically, we have proven that privacy is equivalent to path unlinkability and tag unlinkability implies privacy. Our results simplify the privacy concept and protocol design for RFID-based track and trace systems. Furthermore, we propose an efficient track and trace scheme, Tracker+, which allows for authentic and private identification of RFID-tagged objects in supply chains. In the Tracker+, no computational ability is required for tags, but only a few bytes of storage (such as EPC Class 1 Gen 2 tags are needed to store the tag state. Indeed, Tracker+ reduces the memory requirements for each tag by one group element compared to the Tracker presented in other literature. Moreover, Tracker+ provides privacy against supply chain inside attacks.

  18. An Efficient Context-Aware Privacy Preserving Approach for Smartphones

    Directory of Open Access Journals (Sweden)

    Lichen Zhang

    2017-01-01

    Full Text Available With the proliferation of smartphones and the usage of the smartphone apps, privacy preservation has become an important issue. The existing privacy preservation approaches for smartphones usually have less efficiency due to the absent consideration of the active defense policies and temporal correlations between contexts related to users. In this paper, through modeling the temporal correlations among contexts, we formalize the privacy preservation problem to an optimization problem and prove its correctness and the optimality through theoretical analysis. To further speed up the running time, we transform the original optimization problem to an approximate optimal problem, a linear programming problem. By resolving the linear programming problem, an efficient context-aware privacy preserving algorithm (CAPP is designed, which adopts active defense policy and decides how to release the current context of a user to maximize the level of quality of service (QoS of context-aware apps with privacy preservation. The conducted extensive simulations on real dataset demonstrate the improved performance of CAPP over other traditional approaches.

  19. Effective Management of Information Security and Privacy

    Science.gov (United States)

    Anderson, Alicia

    2006-01-01

    No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…

  20. 31 CFR 0.216 - Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act of...

  1. Designing for Privacy in Ubiquitous Social Networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Figueiras, Joao

    2015-01-01

    are subject to crucial privacy threats. Inspired by the usability and privacy limitations of existing design solutions, we identify, describe and qualitatively evaluate four drawbacks to be avoided when designing ubiquitous social networking applications. By addressing these drawbacks, services become more...... functional and more oriented to ensure the end users' privacy, thus contributing to the long–term success of this technology....

  2. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  3. 24 CFR 3280.107 - Interior privacy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  4. Pass the Cookies and Uphold the Privacy.

    Science.gov (United States)

    Guenther, Kim

    2001-01-01

    Considers how privacy issues related to online profiling affect library patrons and what librarians should do to protect them. Discusses the need for a privacy policy and provides guidelines from the OECD (Organisation for Economic Cooperation and Development) privacy statement generator that can be adapted for libraries. (LRW)

  5. Privacy Notice | IDRC - International Development Research Centre

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC respects the privacy concerns of users of this website. This Privacy Notice explains how personal information that is collected from and about the visitors to IDRC's website is handled. All personal information held or collected by IDRC is protected under Canada's Privacy Act. Information automatically collected from all ...

  6. Enhancing Privacy for Digital Rights Management

    NARCIS (Netherlands)

    Petkovic, M.; Conrado, C.; Schrijen, G.J.; Jonker, Willem

    2007-01-01

    This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM

  7. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey.

    Science.gov (United States)

    Pereira, Stacey; Robinson, Jill Oliver; Peoples, Hayley A; Gutierrez, Amanda M; Majumder, Mary A; McGuire, Amy L; Rothstein, Mark A

    2017-01-01

    The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Using Amazon's Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P social media use were not predictors of level of concern about privacy or security of online or health information (all P > 0.05). This study is limited by the non-representativeness of our sample. Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously.

  8. Preserving Employee Privacy in Wellness.

    Science.gov (United States)

    Terry, Paul E

    2017-07-01

    The proposed "Preserving Employee Wellness Programs Act" states that the collection of information about the manifested disease or disorder of a family member shall not be considered an unlawful acquisition of genetic information. The bill recognizes employee privacy protections that are already in place and includes specific language relating to nondiscrimination based on illness. Why did legislation expressly intending to "preserve wellness programs" generate such antipathy about wellness among journalists? This article argues that those who are committed to preserving employee wellness must be equally committed to preserving employee privacy. Related to this, we should better parse between discussions and rules about commonplace health screenings versus much less common genetic testing.

  9. Location Privacy with Randomness Consistency

    Directory of Open Access Journals (Sweden)

    Wu Hao

    2016-10-01

    Full Text Available Location-Based Social Network (LBSN applications that support geo-location-based posting and queries to provide location-relevant information to mobile users are increasingly popular, but pose a location-privacy risk to posts. We investigated existing LBSNs and location privacy mechanisms, and found a powerful potential attack that can accurately locate users with relatively few queries, even when location data is well secured and location noise is applied. Our technique defeats previously proposed solutions including fake-location detection and query rate limits.

  10. Privacy and the Connected Society

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    The Vision of the 5G enabled connected society is highly based on the evolution and implementation of Internet of Things. This involves, amongst others, a significant raise in devices, sensors and communication in pervasive interconnections as well as cooperation amongst devices and entities acro...... to three selected areas: Shopping, connected cars and online gaming. The paper concludes that privacy is a complexity within the connected society vision and that thee is a need for more privacy use cases to shed light on the challenge....

  11. Improving patients privacy with Pseudonymization.

    Science.gov (United States)

    Neubauer, Thomas; Riedl, Bernhard

    2008-01-01

    e-Health requires the sharing of patient related data when and where necessary. Electronic health records promise to improve communication between health care providers, thus leading to better quality of patients' treatment and reduced costs. As highly sensitive patient information provides a promising goal (e.g., for attackers), there is an increasing social and political pressure to guarantee patients privacy. This paper presents the new system PIPE (Pseudonymization of Information for Privacy in e-Health), that differs from existing approaches in its ability to securely integrate primary and secondary usage of health data.

  12. Modeling the degradation of a metallic waste form intended for geologic disposal

    International Nuclear Information System (INIS)

    Bauer, T.H.; Morris, E.E.

    2007-01-01

    Nuclear reactors operating with metallic fuels have led to development of robust metallic waste forms intended to immobilize hazardous constituents in oxidizing environments. Release data from a wide range of tests where small waste form samples have been immersed in a variety of oxidizing solutions have been analyzed and fit to a mechanistically-derived 'logarithmic growth' form for waste form degradation. A bounding model is described which plausibly extrapolates these fits to long-term degradation in a geologic repository. The resulting empirically-fit degradation model includes dependence on solution pH, temperature, and chloride concentration as well as plausible estimates of statistical uncertainty. (authors)

  13. Privacy and technology challenges for ubiquitous social networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Seet, Boon-Chong

    2015-01-01

    towards important challenges such as social sensing, enabling social networking and privacy protection. In this paper we firstly investigate the methods and technologies for acquisition of the relevant context for promotion of sociability among inhabitants of USN environments. Afterwards, we review...... architectures and techniques for enabling social interactions between participants. Finally, we identify privacy as the major challenge for networking in USN environments. Consequently, we depict design guidelines and review privacy protection models for facilitating personal information disclosure.......Ubiquitous social networking (USN) can be seen as an evolution of ubiquitous computing supporting the social well–being of people in their everyday lives. The vision of USN focuses on enhancing social interactions among its participants during users' physical meetings. This target is leading...

  14. Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Feng Tian

    2014-01-01

    Full Text Available As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. But sufficient security analysis for standard Hilbert curve (SHC is seldom proceeded. In this paper, we propose an index modification method for SHC (SHC∗ and a density-based space filling curve (DSC to improve the security of SHC; they can partially violate the distance-preserving property of SHC, so as to achieve better security. We formally define the indistinguishability and attack model for measuring the privacy disclosure risk of spatial transformation methods. The evaluation results indicate that SHC∗ and DSC are more secure than SHC, and DSC achieves the best index generation performance.

  15. Protecting location privacy for outsourced spatial data in cloud storage.

    Science.gov (United States)

    Tian, Feng; Gui, Xiaolin; An, Jian; Yang, Pan; Zhao, Jianqiang; Zhang, Xuejun

    2014-01-01

    As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. But sufficient security analysis for standard Hilbert curve (SHC) is seldom proceeded. In this paper, we propose an index modification method for SHC (SHC(∗)) and a density-based space filling curve (DSC) to improve the security of SHC; they can partially violate the distance-preserving property of SHC, so as to achieve better security. We formally define the indistinguishability and attack model for measuring the privacy disclosure risk of spatial transformation methods. The evaluation results indicate that SHC(∗) and DSC are more secure than SHC, and DSC achieves the best index generation performance.

  16. Adolescent Perceptions of Parental Privacy Invasion and Adolescent Secrecy: An Illustration of Simpson's Paradox.

    Science.gov (United States)

    Dietvorst, Evelien; Hiemstra, Marieke; Hillegers, Manon H J; Keijsers, Loes

    2017-11-27

    Adolescents' secrecy is intertwined with perception of parents' behaviors as acts of privacy invasion. It is currently untested, however, how this transactional process operates at the within-person level-where these causal processes take place. Dutch adolescents (n = 244, M age  = 13.84, 38.50% boys) reported three times on perceived parental privacy invasion and secrecy. Cross-lagged panel models (CLPM) confirmed earlier findings. Privacy invasion predicted increased secrecy, but a reverse effect was found from increased secrecy to increased privacy invasion. Controlling for confounding positive group-level associations with a novel random intercept CLPM, negative within-person associations were found. Higher levels of secrecy predicted lower levels of privacy invasive behaviors at the within-person level. These opposing findings within- versus between-persons illustrate a Simpson's paradox. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.

  17. Intimacy, Confidentiality, and Power: Kiss and Tell as a Feminist Critique of Privacy Law

    Directory of Open Access Journals (Sweden)

    Naomh Gibson

    2015-12-01

    Full Text Available The current principle of privacy and its enactment in law and policy is presented as a reified, universal value that is gender-neutral. However this article contends this presumption, and advances that privacy is an inconsistent area of law that has allowed for the oppression of women’s rights and interests. It will be proposed that the narrative of ‘kiss and tell’ stories offers access to substantive justice and equality by subverting legal and gender norms and deconstructing the concept of privacy. Using the tools of feminist legal theory and theoretical commentary, this argument forms four sections. Firstly, it will be introduced that privacy is a value which is nebulous at best, and the reasons for critiquing privacy law using a perspective from feminist legal theory will be explored. Following this, the injustices perpetrated against women by the current state of privacy law will be outlined – particularly in the area of sexual information and sexuality. Using examples from both the UK and American jurisdictions, it will be submitted that privacy law is mired in patriarchal values. Thirdly, the jurisprudence underpinning privacy law decisions on sexual relationships and the legal concepts of confidence and intimacy will be critically examined and deconstructed. Finally, drawing upon investigative research, anecdotal evidence, and critical analysis, it will be submitted that ‘kiss and tell’ narratives are the way forward to reconceptualise privacy. It will be recommended that kiss and tell stories have value in social communication and present a chance for women to engage in relevant public discourse, and more widely, gives law an opportunity to reach a new understanding of privacy appropriate in the modern age.

  18. Multi-scale friction modeling for sheet metal forming: the boundary lubrication regime

    NARCIS (Netherlands)

    Hol, J.D.; Meinders, Vincent T.; de Rooij, Matthias B.; van den Boogaard, Antonius H.

    2015-01-01

    A physical based friction model is presented to describe friction in full-scale forming simulations. The advanced friction model accounts for the change in surface topography and the evolution of friction in the boundary lubrication regime. The implementation of the friction model in FE software

  19. On the structure of the space of geometric product-form models

    NARCIS (Netherlands)

    Bayer, Nimrod; Boucherie, Richardus J.

    2002-01-01

    This article deals with Markovian models defined on a finite-dimensional discrete state space and possess a stationary state distribution of a product-form. We view the space of such models as a mathematical object and explore its structure. We focus on models on an orthant [script Z]+n, which are

  20. Rare disease research: Breaking the privacy barrier

    Directory of Open Access Journals (Sweden)

    Deborah Mascalzoni

    2014-06-01

    Full Text Available Due to the few patients affected, rare disease research has to count on international registries to exist in order to produce significant research outputs. Data sharing of registries is therefore a unique resource to allow rare disease research to flourish and any lost data will jeopardize the quality of an already extremely difficult research. The rules usually applied to research such as the right to withdraw or the need for specific consent for every use of data can be detrimental in order to get effective results. Privacy rights regulated through traditional informed consent mechanisms have been regarded as a major barrier in order to effectively share data worldwide. Some authors argue that this barrier hampers results that could be beneficial to the patients so that another right will be overstated: the right to quality healthcare. We argue in this paper that privacy has been often interpreted just one-sided as the right to secrecy but it can entail another meaning: the right to manage one's own private sphere. Managing it pertains, not only to the right to deny access, but also to the right to grant access. At the same time research on patient participation and transparency shows that new forms of IT-based informed consent can provide a good balance between the right of individuals to be in control of their data and the opportunity for science to pursue international research.

  1. E M form factors of the nucleon in a chiral model with momentum projection

    International Nuclear Information System (INIS)

    Drago, A.; Tambini, U.; Fiolhais, M.

    1997-01-01

    The chiral chromo dielectric model with a quadratic potential for the confining field is used to compute electromagnetic form factors of the nucleon. A variational approach based on the hedgehog Ansatz and on angular momentum-isospin and linear momentum projection formalism is applied to describe the nucleon. The form factors are computed using momentum eigenstates, therefore taking into account recoil effects. With the exception of the magnetic form factor of the proton, the others are well reproduced. (author)

  2. Study of baryon octet charge form factors in perturbative chiral quark model

    International Nuclear Information System (INIS)

    Liu, X.Y.; Khosonthongkee, K.; Limphirat, A.; Yan, Y.

    2014-01-01

    The charge form factors of baryon octet are studied in the perturbative chiral quark model (PCQM). The relativistic quark wave function is extracted by fitting the theoretical results of the nucleon charge form factors to the experimental data and the predetermined quark wave function is applied to study the charge form factors of other octet baryons. The PCQM results are found, based on the predetermined quark wave function, in good agreement with the experimental data. (author)

  3. Remarks on electromagnetic form factors of hadrons in the quark model

    International Nuclear Information System (INIS)

    Vainshtein, A.I.; Zakharov, V.I.

    1977-01-01

    Relations between the transversal and longitudinal parts of elastic and quasielastic form factors are studied within the quark model. It is shown that for an even number of the constituent quarks the longitudinal part dominates while for an odd number the transversal part is the largest one. Consequences form this result are considered for deuteron form factor and for matrix elements of the electromagnetic transitions between π, rho, A 1 mesons

  4. 76 FR 44888 - Privacy Act of 1974, System of Records

    Science.gov (United States)

    2011-07-27

    ...'') cloud computing model. The suite is composed of Gmail for e-mail, Google Docs for office productivity... Privacy Act of 1974 (5 U.S.C. 552a), as amended, entitled ``USAID-30, Google Apps Business Edition''. This... . SUPPLEMENTARY INFORMATION: The Google Apps Business Edition is being established as an Agency-wide system of...

  5. Investigating privacy attitudes and behavior in relation to personalization

    NARCIS (Netherlands)

    Garde-Perik, E. van de; Markopoulos, P.; Ruyter, B.E.R. de; Eggen, B.; IJsselsteijn, W.A.

    2008-01-01

    This article presents an experimental study of privacy-related attitudes and behaviors regarding a music recommender service based on two types of user modeling: personality traits and musical preferences. Contrary to prior expectations and attitudes reported by participants, personality traits are

  6. 78 FR 46256 - Privacy Act

    Science.gov (United States)

    2013-07-31

    ... FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code of 1954.'' are added at the end of the definition of Act. [FR Doc. 2013-18535 Filed 7...

  7. Student Data Privacy Communications Toolkit

    Science.gov (United States)

    Foundation for Excellence in Education, 2016

    2016-01-01

    Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…

  8. Panel: RFID Security and Privacy

    Science.gov (United States)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  9. PROTECTION OF PRIVACY THROUGH MICROAGGREGATION

    OpenAIRE

    Edgar L. Feige; Harold W. Watts

    2005-01-01

    A proposal for maintaining privacy protection in large data bases by the use of partially aggregated data instead of the original individual data. Proper micro aggregation techniques can serve to protect the confidential nature of the individual data with minimumal information loss. Reference:Data base4s, Computers and the Social Sciences, R. Bisco (ed.),Wiley, 1970, pp. 261-272

  10. Biobanking and Privacy in India.

    Science.gov (United States)

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India. © 2016 American Society of Law, Medicine & Ethics.

  11. Privacy in Online Social Networks

    NARCIS (Netherlands)

    Beye, Michael; Jeckmans, Arjan; Erkin, Zekeriya; Erkin, Zekeriya; Hartel, Pieter H.; Lagendijk, Reginald; Tang, Qiang; Abraham, A.

    Online Social Networks (OSNs) have become part of daily life for millions of users. Users building explicit networks that represent their social relationships and often share a wealth of personal information to their own benefit. The potential privacy risks of such behavior are often underestimated

  12. Privacy proof in the cloud

    NARCIS (Netherlands)

    Jessen, Veerle; Weigand, Hans; Mouratidis, Haris

    Cloud computing has been a frequently researched subject as it brings many advantages, such as the ability to store data remotely and scale rapidly, but also comes with several issues, including privacy, trust and security. The decision whether it is best to go `into the cloud' or to `stay inside'

  13. Privacy concerns in smart cities

    NARCIS (Netherlands)

    E.A. van Zoonen (Liesbet)

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in

  14. Protecting Your Child's Privacy Online

    Science.gov (United States)

    ... esta página en español Protecting Your Child’s Privacy Online Share This Page Facebook Twitter Linked-In Related ... Items Talk to Your Kids Kids and Socializing Online As a parent, you have control over the ...

  15. The European Approach to Privacy

    NARCIS (Netherlands)

    van Hoboken, J.

    2014-01-01

    This paper critically assesses the character of European (Union’s) privacy law and policy in the field of online media and electronic communications. Contrary to current understanding, this field of law is more fragmented and ill-developed than is often assumed, in particular by those discussing

  16. Physical factors that influence patients’ privacy perception toward a psychiatric behavioral monitoring system: a qualitative study

    Directory of Open Access Journals (Sweden)

    Zakaria N

    2017-12-01

    Full Text Available Nasriah Zakaria,1,2 Rusyaizila Ramli3 1Research Chair of Health Informatics and Promotion, 2Medical Informatics and E-learning Unit, Medical Education Department, College of Medicine, King Saud University, Riyadh, Kingdom of Saudi Arabia; 3Advanced Military Maintenance Repair and Overhaul Center (AMMROC, Abu Dhabi, UAE Background: Psychiatric patients have privacy concerns when it comes to technology intervention in the hospital setting. In this paper, we present scenarios for psychiatric behavioral monitoring systems to be placed in psychiatric wards to understand patients’ perception regarding privacy. Psychiatric behavioral monitoring refers to systems that are deemed useful in measuring clinical outcomes, but little research has been done on how these systems will impact patients’ privacy. Methods: We conducted a case study in one teaching hospital in Malaysia. We investigated the physical factors that influence patients’ perceived privacy with respect to a psychiatric monitoring system. The eight physical factors identified from the information system development privacy model, a comprehensive model for designing a privacy-sensitive information system, were adapted in this research. Scenario-based interviews were conducted with 25 patients in a psychiatric ward for 3 months. Results: Psychiatric patients were able to share how physical factors influence their perception of privacy. Results show how patients responded to each of these dimensions in the context of a psychiatric behavioral monitoring system. Conclusion: Some subfactors under physical privacy are modified to reflect the data obtained in the interviews. We were able to capture the different physical factors that influence patient privacy. Keywords: information system development (ISD, physical factor, privacy, psychiatric monitoring system

  17. Using Canonical Forms for Isomorphism Reduction in Graph-based Model Checking

    NARCIS (Netherlands)

    Kant, Gijs

    Graph isomorphism checking can be used in graph-based model checking to achieve symmetry reduction. Instead of one-to-one comparing the graph representations of states, canonical forms of state graphs can be computed. These canonical forms can be used to store and compare states. However, computing

  18. Modelling, screening, and solving of optimisation problems: Application to industrial metal forming processes

    NARCIS (Netherlands)

    Bonte, M.H.A.; van den Boogaard, Antonius H.; Veldman, E.

    2007-01-01

    Coupling Finite Element (FEM) simulations to mathematical optimisation techniques provides a high potential to improve industrial metal forming processes. In order to optimise these processes, all kind of optimisation problems need to be mathematically modelled and subsequently solved using an

  19. The right to privacy at work

    Directory of Open Access Journals (Sweden)

    Danilović Jelena

    2017-01-01

    Full Text Available This paper discusses employees' right to privacy at work at the beginning of XXI century in Serbia and its relation to international regulations and practice. The right to privacy at work, in the context of this analysis, is considered as the right to protect employee's personal data from employer's improper intrusion. The first part of the paper provides overview of theories on privacy right as well as current data protection legal framework. This section shows that the concept of privacy changed significantly during the history and that development of data protection legislation, though intense, did not clarify some of the main ambiguities linked to this concept. Especially in Serbia, where data protection regulation is relatively new and practice rudimentary, there are many queries linked to the issue of privacy at work. The second part of the paper analyses in more details origins and importance of privacy legal standard established in the international practice - the 'reasonable expectations of privacy'. Understanding of this legal standard and especially its influence to recent court practice of the European Court of Human Rights is important for comprehension of employee's right to privacy. In-depth analysis shows that this standard includes an external element (privacy expected by the society and internal element (privacy expected within the specific employer. While there are conceptual differences between the USA and European practice, the internal element of this legal standard in both cases has a major influence in the employment privacy disputes. Finally, the paper proposes that enacting of internal privacy policies, with full respect of data protection regulations, could provide for viable reasonable expectations of privacy at work. This may eventually lead to easier distinction of the fine line between employee's privacy and employer's interests.

  20. Partially Compensatory Multidimensional Item Response Theory Models: Two Alternate Model Forms

    Science.gov (United States)

    DeMars, Christine E.

    2016-01-01

    Partially compensatory models may capture the cognitive skills needed to answer test items more realistically than compensatory models, but estimating the model parameters may be a challenge. Data were simulated to follow two different partially compensatory models, a model with an interaction term and a product model. The model parameters were…

  1. Governance Through Privacy, Fairness, and Respect for Individuals.

    Science.gov (United States)

    Baker, Dixie B; Kaye, Jane; Terry, Sharon F

    2016-01-01

    Individuals have a moral claim to be involved in the governance of their personal data. Individuals' rights include privacy, autonomy, and the ability to choose for themselves how they want to manage risk, consistent with their own personal values and life situations. The Fair Information Practices principles (FIPPs) offer a framework for governance. Privacy-enhancing technology that complies with applicable law and FIPPs offers a dynamic governance tool for enabling the fair and open use of individual's personal data. Any governance model must protect against the risks posed by data misuse. Individual perceptions of risks are a subjective function involving individuals' values toward self, family, and society, their perceptions of trust, and their cognitive decision-making skills. Individual privacy protections and individuals' right to choose are codified in the HIPAA Privacy Rule, which attempts to strike a balance between the dual goals of information flow and privacy protection. The choices most commonly given individuals regarding the use of their health information are binary ("yes" or "no") and immutable. Recent federal recommendations and law recognize the need for granular, dynamic choices. Individuals expect that they will govern the use of their own health and genomic data. Failure to build and maintain individuals' trust increases the likelihood that they will refuse to grant permission to access or use their data. The "no surprises principle" asserts that an individual's personal information should never be collected, used, transmitted, or disclosed in a way that would surprise the individual were she to learn about it. The FIPPs provide a powerful framework for enabling data sharing and use, while maintaining trust. We introduce the eight FIPPs adopted by the Department of Health and Human Services, and provide examples of their interpretation and implementation. Privacy risk and health risk can be reduced by giving consumers control, autonomy, and

  2. A new closed-form thermodynamic model for thermal simulation of spark ignition internal combustion engines

    International Nuclear Information System (INIS)

    Barjaneh, Afshin; Sayyaadi, Hoseyn

    2015-01-01

    Highlights: • A new closed-form thermal model was developed for SI engines. • Various irreversibilities of real engines were integrated into the model. • The accuracy of the model was examined on two real SI engines. • The superiority of the model to previous closed-form models was shown. • Accuracy and losses were studied over the operating range of engines. - Abstract: A closed form model based on finite speed thermodynamics, FST, modified to consider various losses was developed on Otto cycle. In this regard, the governing equations of the finite speed thermodynamics were developed for expansion/compression processes while heat absorption/rejection of the Otto cycle was determined based on finite time thermodynamics, FTT. In addition, other irreversibility including power loss caused by heat transfer through the cylinder walls and irreversibility due to throttling process was integrated into the model. The developed model was verified by implementing on two different spark ignition internal combustion engines and the results of modeling were compared with experimental results as well as FTT model. It was found that the developed model was not only very simple in use like a closed form thermodynamic model, but also it models a real spark ignition engine with reasonable accuracy. The error in predicting the output power at rated operating range of the engine was 39%, while in the case of the FTT model, this figure was 167.5%. This comparison for predicting thermal efficiency was +7% error (as difference) for the developed model compared to +39.4% error of FTT model.

  3. Quantifying the costs and benefits of privacy-preserving health data publishing.

    Science.gov (United States)

    Khokhar, Rashid Hussain; Chen, Rui; Fung, Benjamin C M; Lui, Siu Man

    2014-08-01

    Cost-benefit analysis is a prerequisite for making good business decisions. In the business environment, companies intend to make profit from maximizing information utility of published data while having an obligation to protect individual privacy. In this paper, we quantify the trade-off between privacy and data utility in health data publishing in terms of monetary value. We propose an analytical cost model that can help health information custodians (HICs) make better decisions about sharing person-specific health data with other parties. We examine relevant cost factors associated with the value of anonymized data and the possible damage cost due to potential privacy breaches. Our model guides an HIC to find the optimal value of publishing health data and could be utilized for both perturbative and non-perturbative anonymization techniques. We show that our approach can identify the optimal value for different privacy models, including K-anonymity, LKC-privacy, and ∊-differential privacy, under various anonymization algorithms and privacy parameters through extensive experiments on real-life data. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey.

    Directory of Open Access Journals (Sweden)

    Stacey Pereira

    Full Text Available The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary.Using Amazon's Mechanical Turk (MTurk, which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information.1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P 0.05.This study is limited by the non-representativeness of our sample.Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously.

  5. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey

    Science.gov (United States)

    Pereira, Stacey; Robinson, Jill Oliver; Gutierrez, Amanda M.; Majumder, Mary A.; McGuire, Amy L.; Rothstein, Mark A.

    2017-01-01

    Background The importance of health privacy protections in the era of the “Facebook Generation” has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents’ views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Methods Using Amazon’s Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. Results 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P 0.05). Limitations This study is limited by the non-representativeness of our sample. Conclusions Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously. PMID:28926626

  6. Finite element modelling of chain-die forming for ultra-high strength steel

    Science.gov (United States)

    Majji, Raju; Xiang, Yang; Ding, Scott; Yang, Chunhui

    2017-10-01

    There has been a high demand for weight reduction in automotive vehicles while maintaining passenger safety. A potential steel material to achieve this is Ultra High Strength Steel (UHSS). As a high strength material, it is difficult to be formed with desired profiles using traditional sheet metal forming processes such as Cold Roll Forming. To overcome this problem, a potentially alternative solution is Chain-die Forming (CDF), recently developed. The basic principal of the CDF is to fully combine roll forming and bending processes. The main advantage of this process is the elongated deformation length that significantly increases effective roll radius. This study focuses on identifying issues with the CDF by using CAD modelling, Motion Analysis and Finite Element Analysis (FEA) to devise solutions and construct a more reliable process in an optimal design sense. Some attempts on finite element modelling and simulation of the CDF were conducted using relatively simple models in literature and the research was still not sufficient enough for optimal design of a typical CDF for UHSS. Therefore two numerical models of Chain-die Forming process are developed in this study, including a) one having a set of rolls similar to roll forming but with a large radius, i.e., 20 meters; and b) the other one with dies and punch segments similar to a typical CDF machine. As a case study, to form a 60° channel with single pass was conducted using these two devised models for a comparison. The obtained numerical results clearly show the CDF could generate less residual stress, low strain and small springback of a single pass for the 60° UHSS channel. The design analysis procedure proposed in this study could greatly help the mechanical designers to devise a cost-effective and reliable CDF process for forming UHSS.

  7. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  8. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  9. Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering

    Directory of Open Access Journals (Sweden)

    Buescher Niklas

    2017-10-01

    Full Text Available The widespread deployment of smart meters that frequently report energy consumption information, is a known threat to consumers’ privacy. Many promising privacy protection mechanisms based on secure aggregation schemes have been proposed. Even though these schemes are cryptographically secure, the energy provider has access to the plaintext aggregated power consumption. A privacy trade-off exists between the size of the aggregation scheme and the personal data that might be leaked, where smaller aggregation sizes leak more personal data. Recently, a UK industrial body has studied this privacy trade-off and identified that two smart meters forming an aggregate, are sufficient to achieve privacy. In this work, we challenge this study and investigate which aggregation sizes are sufficient to achieve privacy in the smart grid. Therefore, we propose a flexible, yet formal privacy metric using a cryptographic game based definition. Studying publicly-available, real world energy consumption datasets with various temporal resolutions, ranging from minutes to hourly intervals, we show that a typical household can be identified with very high probability. For example, we observe a 50% advantage over random guessing in identifying households for an aggregation size of 20 households with a 15-minutes reporting interval. Furthermore, our results indicate that single appliances can be identified with significant probability in aggregation sizes up to 10 households.

  10. Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems

    Science.gov (United States)

    Parra-Arnau, Javier; Rebollo-Monedero, David; Forné, Jordi

    2014-03-01

    Recommendation systems are information-filtering systems that tailor information to users on the basis of knowledge about their preferences. The ability of these systems to profile users is what enables such intelligent functionality, but at the same time, it is the source of serious privacy concerns. In this paper we investigate a privacy-enhancing technology that aims at hindering an attacker in its efforts to accurately profile users based on the items they rate. Our approach capitalizes on the combination of two perturbative mechanisms---the forgery and the suppression of ratings. While this technique enhances user privacy to a certain extent, it inevitably comes at the cost of a loss in data utility, namely a degradation of the recommendation's accuracy. In short, it poses a trade-off between privacy and utility. The theoretical analysis of said trade-off is the object of this work. We measure privacy as the Kullback-Leibler divergence between the user's and the population's item distributions, and quantify utility as the proportion of ratings users consent to forge and eliminate. Equipped with these quantitative measures, we find a closed-form solution to the problem of optimal forgery and suppression of ratings, and characterize the trade-off among privacy, forgery rate and suppression rate. Experimental results on a popular recommendation system show how our approach may contribute to privacy enhancement.

  11. Form factors of exponential fields for two-parametric family of integrable models

    International Nuclear Information System (INIS)

    Fateev, V.A.; Lashkevich, M.

    2004-01-01

    A two-parametric family of integrable models (the SS model) that contains as particular cases several well known integrable quantum field theories is considered. After the quantum group restriction it describes a wide class of integrable perturbed conformal field theories. Exponential fields in the SS model are closely related to the primary fields in these perturbed theories. We use the bosonization approach to derive an integral representation for the form factors of the exponential fields in the SS model. The same representations for the sausage model and the cosine-cosine model are obtained as limiting cases. The results are tested at the special points, where the theory contains free particles

  12. Form factors of exponential fields for two-parametric family of integrable models

    Science.gov (United States)

    Fateev, V. A.; Lashkevich, M.

    2004-09-01

    A two-parametric family of integrable models (the SS model) that contains as particular cases several well known integrable quantum field theories is considered. After the quantum group restriction it describes a wide class of integrable perturbed conformal field theories. Exponential fields in the SS model are closely related to the primary fields in these perturbed theories. We use the bosonization approach to derive an integral representation for the form factors of the exponential fields in the SS model. The same representations for the sausage model and the cosine-cosine model are obtained as limiting cases. The results are tested at the special points, where the theory contains free particles.

  13. Modeling plan-form deltaic response to changes in fluvial sediment supply

    NARCIS (Netherlands)

    Nienhuis, J.H.; Ashton, A.D.; Roos, Pieter C.; Hulscher, Suzanne J.M.H.; Giosan, L.; Kranenburg, W.M.; Horstman, E.M.; Wijnberg, K.M.

    2012-01-01

    This study focuses on the effects of changes in fluvial sediment supply on the plan-form shape of wave-dominated deltas. We apply a one-line numerical shoreline model to calculate shoreline evolution after (I) elimination and (II) time-periodic variation of fluvial input. Model results suggest four

  14. Towards more variation in text generation : Developing and evaluating variation models for choice of referential form

    NARCIS (Netherlands)

    Castro Ferreira, Thiago; Krahmer, Emiel; Wubben, Sander

    In this study, we introduce a nondeterministic method for referring expression generation. We describe two models that account for individual variation in the choice of referential form in automatically generated text: a Naive Bayes model and a Recurrent Neural Network. Both are evaluated using the

  15. Testing the Granger noncausality hypothesis in stationary nonlinear models of unknown functional form

    DEFF Research Database (Denmark)

    Péguin-Feissolle, Anne; Strikholm, Birgit; Teräsvirta, Timo

    In this paper we propose a general method for testing the Granger noncausality hypothesis in stationary nonlinear models of unknown functional form. These tests are based on a Taylor expansion of the nonlinear model around a given point in the sample space. We study the performance of our tests...

  16. COUPLED ATOMIZATION AND SPRAY MODELLING IN THE SPRAY FORMING PROCESS USING OPENFOAM

    DEFF Research Database (Denmark)

    Gjesing, Rasmus; Hattel, Jesper Henri; Fritsching, Udo

    2009-01-01

    The paper presents a numerical model capable of simulating the atomization, break-up and in-flight spray phenomena in the spray forming process. The model is developed and implemented in the freeware code openFOAM. The focus is on studying the coupling effect of the melt break-up phenomena...

  17. Privacy-Preserving Data Analysis Techniques by using different modules

    OpenAIRE

    Payal P. Wasankar; Prof. Arvind S. Kapse

    2013-01-01

    The competing parties who have private data may collaboratively conduct privacy preserving distributed data analysis (PPDA) tasks to learn beneficial data models or analysis results. For example, different credit card companies may try to build better models for credit card fraud detection through PPDA tasks. Similarly, competing companies in the same industry may try to combine their sales data to build models that may predict the future sales. In many of these cases, the competing parties h...

  18. Data collection framework for energy efficient privacy preservation in wireless sensor networks having many-to-many structures.

    Science.gov (United States)

    Bahşi, Hayretdin; Levi, Albert

    2010-01-01

    Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network.

  19. Data Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures

    Directory of Open Access Journals (Sweden)

    Hayretdin Bahsi

    2010-09-01

    Full Text Available Wireless sensor networks (WSNs generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network.

  20. Privacy Protection: Mandating New Arrangements to Implement and Assess Federal Privacy Policy and Practice

    National Research Council Canada - National Science Library

    Relyea, Harold C

    2004-01-01

    When Congress enacted the Privacy Act of 1974, it established a temporary national study commission to conduct a comprehensive assessment of privacy policy and practice in both the public and private...

  1. Implementing Network Common Data Form (netCDF) for the 3DWF Model

    Science.gov (United States)

    2016-02-01

    Form (netCDF) software package for Windows distributed by the Unidata Program Center at the University Corporation for Atmospheric Research (UCAR) in...standard ASCII format, while the provided WRF model results are often in netCDF format. Therefore, the 3DWF model and its GUI needed to be modified so...Garvey D, Chang S, Cogan J. Application of a multigrid method to a mass consistent diagnostic wind model. J. Appl . Meteorology. 2005;44:1078–1089

  2. ARCHITECTURAL FORM CREATION IN THE DESIGN STUDIO: PHYSICAL MODELING AS AN EFFECTIVE DESIGN TOOL

    Directory of Open Access Journals (Sweden)

    Wael Abdelhameed

    2011-11-01

    Full Text Available This research paper attempts to shed more light on an area of the design studio, which concerns with the use of physical modeling as a design medium in architectural form creation. An experiment has been carried out during an architectural design studio in order to not only investigate physical modeling as a tool of form creation but also improve visual design thinking that students employ while using this manual tool. To achieve the research objective, a method was proposed and applied to track form creation processes, based upon three types of operation, namely: sketching transformations, divergent physical-modeling transformations, and convergent physical-modeling transformations. The method helps record the innovative transitions of form during conceptual designing in a simple way. Investigating form creation processes and activities associated with visual design thinking enables the research to conclude to general results of the role of physical modeling in the conceptual phase of designing, and to specific results of the methods used in this architectural design studio experiment.

  3. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... these two. Based on a study of corporate social responsibility disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a corporate social responsibility. The findings indicate that only a small proportion...... of the companies have comprehensive privacy programs, although more than half of them voice moral or relational motives for addressing online privacy. The privacy measures they have taken are primarily compliance measures, while measures that stimulate a stakeholder dialogue are rare. Overall, a wide variety...

  4. Privacy protecting biometric authentication systems

    OpenAIRE

    Kholmatov, Alisher Anatolyevich

    2008-01-01

    As biometrics gains popularity and proliferates into the daily life, there is an increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The major concerns are about i) the use of biometrics to track people, ii) non-revocability of biometrics (eg. if a fingerprint is compromised it can not be canceled or reissued), and iii) disclosure of sensitive information such as race, gender and health problems which may be revealed by biometric ...

  5. Modelling microbial exchanges between forms of soil nitrogen in contrasting ecosystems

    Science.gov (United States)

    Pansu, M.; Machado, D.; Bottner, P.; Sarmiento, L.

    2014-02-01

    Although nitrogen (N) is often combined with carbon (C) in organic molecules, C passes from the air to the soil through plant photosynthesis, whereas N passes from the soil to plants through a chain of microbial conversions. However, dynamic models do not fully consider the microorganisms at the centre of exchange processes between organic and mineral forms of N. This study monitored the transfer of 14C and 15N between plant materials, microorganisms, humified compartments, and inorganic forms in six very different ecosystems along an altitudinal transect. The microbial conversions of the 15N forms appear to be strongly linked to the previously modelled C cycle, and the same equations and parameters can be used to model both C and N cycles. The only difference is in the modelling of the flows between microbial and inorganic forms. The processes of mineralization and immobilization of N appear to be regulated by a two-way microbial exchange depending on the C : N ratios of microorganisms and available substrates. The MOMOS (Modelling of Organic Matter of Soils) model has already been validated for the C cycle and also appears to be valid for the prediction of microbial transformations of N forms. This study shows that the hypothesis of microbial homeostasis can give robust predictions at global scale. However, the microbial populations did not appear to always be independent of the external constraints. At some altitudes their C : N ratio could be better modelled as decreasing during incubation and increasing with increasing C storage in cold conditions. The ratio of potentially mineralizable-15N/inorganic-15N and the 15N stock in the plant debris and the microorganisms was modelled as increasing with altitude, whereas the 15N storage in stable humus was modelled as decreasing with altitude. This predicts that there is a risk that mineralization of organic reserves in cold areas may increase global warming.

  6. MODEL OF METHODS OF FORMING BIOLOGICAL PICTURE OF THE WORLD OF SECONDARY SCHOOL PUPILS

    Directory of Open Access Journals (Sweden)

    Mikhail A. Yakunchev

    2016-12-01

    Full Text Available Introduction: the problem of development of a model of methods of forming the biological picture of the world of pupils as a multicomponent and integrative expression of the complete educational process is considered in the article. It is stated that the results of the study have theoretical and practical importance for effective subject preparation of senior pupils based on acquiring of systematic and generalized knowledge about wildlife. The correspondence of the main idea of the article to the scientific profile of the journal “Integration of Education” determines the choice of the periodical for publication. Materials and Methods: the results of the analysis of materials on modeling of the educational process, on specific models of the formation of a complete comprehension of the scientific picture of the world and its biological component make it possible to suggest a lack of elaboration of the aspect of pedagogical research under study. Therefore, the search for methods to overcome these gaps and to substantiate a particular model, relevant for its practical application by a teacher, is important. The study was based on the use of methods of theoretical level, including the analysis of pedagogical and methodological literature, modeling and generalized expression of the model of forming the biological picture of the world of secondary school senior pupils, which were of higher priority. Results: the use of models of organization of subject preparation of secondary school pupils takes a priority position, as they help to achieve the desired results of training, education and development. The model of methods of forming a biological picture of the world is represented as a theoretical construct in the unity of objective, substantive, procedural, diagnostic and effective blocks. Discussion and Conclusions: in a generalized form the article expresses the model of methods of forming the biological picture of the world of secondary school

  7. Privacy Protection on Multiple Sensitive Attributes

    Science.gov (United States)

    Li, Zhen; Ye, Xiaojun

    In recent years, a privacy model called k-anonymity has gained popularity in the microdata releasing. As the microdata may contain multiple sensitive attributes about an individual, the protection of multiple sensitive attributes has become an important problem. Different from the existing models of single sensitive attribute, extra associations among multiple sensitive attributes should be invested. Two kinds of disclosure scenarios may happen because of logical associations. The Q&S Diversity is checked to prevent the foregoing disclosure risks, with an α Requirement definition used to ensure the diversity requirement. At last, a two-step greedy generalization algorithm is used to carry out the multiple sensitive attributes processing which deal with quasi-identifiers and sensitive attributes respectively. We reduce the overall distortion by the measure of Masking SA.

  8. Functional forms and price elasticities in a discrete continuous choice model of the residential water demand

    Science.gov (United States)

    Vásquez Lavín, F. A.; Hernandez, J. I.; Ponce, R. D.; Orrego, S. A.

    2017-07-01

    During recent decades, water demand estimation has gained considerable attention from scholars. From an econometric perspective, the most used functional forms include log-log and linear specifications. Despite the advances in this field and the relevance for policymaking, little attention has been paid to the functional forms used in these estimations, and most authors have not provided justifications for their selection of functional forms. A discrete continuous choice model of the residential water demand is estimated using six functional forms (log-log, full-log, log-quadratic, semilog, linear, and Stone-Geary), and the expected consumption and price elasticity are evaluated. From a policy perspective, our results highlight the relevance of functional form selection for both the expected consumption and price elasticity.

  9. Portrait of a Privacy Invasion

    Directory of Open Access Journals (Sweden)

    Shoshitaishvili Yan

    2015-04-01

    Full Text Available The popularity of online social networks has changed the way in which we share personal thoughts, political views, and pictures. Pictures have a particularly important role in the privacy of users, as they can convey substantial information (e.g., a person was attending an event, or has met with another person. Moreover, because of the nature of social networks, it has become increasingly difficult to control who has access to which content. Therefore, when a substantial amount of pictures are accessible to one party, there is a very serious potential for violations of the privacy of users. In this paper, we demonstrate a novel technique that, given a large corpus of pictures shared on a social network, automatically determines who is dating whom, with reasonable precision. More specifically, our approach combines facial recognition, spatial analysis, and machine learning techniques to determine pairs that are dating. To the best of our knowledge, this is the first privacy attack of this kind performed on social networks. We implemented our approach in a tool, called Creepic, and evaluated it on two real-world datasets. The results show that it is possible to automatically extract non-obvious, and nondisclosed, relationships between people represented in a group of pictures, even when the people involved are not directly part of a connected social clique.

  10. MATHEMATICAL MODELING OF THE PROCESS OF CRYSTALLIZATION CORES TURNOUTS IN THE TWO CASTING FORM

    Directory of Open Access Journals (Sweden)

    B. M. Smirnov

    2008-12-01

    Full Text Available The mathematical model of the temperature field of the «Casting» system is presented in the article. «Casting» as a two-layer foundry form is supposed to estimate the character of propagation of crystallization front along the casting section and to define the parameters of the casting form, which will provide the most favorable thermal conditions of the core structure formation.

  11. Radial Basis Functional Model of Multi-Point Dieless Forming Process for Springback Reduction and Compensation

    OpenAIRE

    Misganaw Abebe; Jun-Seok Yoon; Beom-Soo Kang

    2017-01-01

    Springback in multi-point dieless forming (MDF) is a common problem because of the small deformation and blank holder free boundary condition. Numerical simulations are widely used in sheet metal forming to predict the springback. However, the computational time in using the numerical tools is time costly to find the optimal process parameters value. This study proposes radial basis function (RBF) to replace the numerical simulation model by using statistical analyses that are based on a desi...

  12. An Alternative View of Privacy on Facebook

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2011-02-01

    Full Text Available The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy tends to ignore the political economy of privacy in capitalism that can mask socio-economic inequality and protect capital and the rich from public accountability. Facebook is in this paper analyzed with the help of an approach, in which privacy for dominant groups, in regard to the ability of keeping wealth and power secret from the public, is seen as problematic, whereas privacy at the bottom of the power pyramid for consumers and normal citizens is seen as a protection from dominant interests. Facebook’s privacy concept is based on an understanding that stresses self-regulation and on an individualistic understanding of privacy. The theoretical analysis of the political economy of privacy on Facebook in this paper is based on the political theories of Karl Marx, Hannah Arendt and Jürgen Habermas. Based on the political economist Dallas Smythe’s concept of audience commodification, the process of prosumer commodification on Facebook is analyzed. The political economy of privacy on Facebook is analyzed with the help of a theory of drives that is grounded in Herbert Marcuse’s interpretation of Sigmund Freud, which allows to analyze Facebook based on the concept of play labor (= the convergence of play and labor.

  13. Facebook: Personality and privacy on profiles

    OpenAIRE

    Casado Riera, Carla; Oberst, Ursula; Carbonell, Xavier

    2015-01-01

    The aim of this study was to study the possible relationship between the privacy settings in Facebook profiles and two personality dimensions, extraversion and neuroticism, in relation to gender. The Privacy on Facebook Questionnaire and the Eysenck Personality Inventory was applied to a sample of 92 womenand 70 men, all users of Facebook. No significant relationship was found between extraversion or neuroticism and the privacy settings of Facebook profiles, but the results showed significant...

  14. A power-law coupled three-form dark energy model

    Science.gov (United States)

    Yao, Yan-Hong; Yan, Yang-Jie; Meng, Xin-He

    2018-02-01

    We consider a field theory model of coupled dark energy which treats dark energy as a three-form field and dark matter as a spinor field. By assuming the effective mass of dark matter as a power-law function of the three-form field and neglecting the potential term of dark energy, we obtain three solutions of the autonomous system of evolution equations, including a de Sitter attractor, a tracking solution and an approximate solution. To understand the strength of the coupling, we confront the model with the latest Type Ia Supernova, Baryon Acoustic Oscillations and Cosmic Microwave Background radiation observations, with the conclusion that the combination of these three databases marginalized over the present dark matter density parameter Ω _{m0} and the present three-form field κ X0 gives stringent constraints on the coupling constant, - 0.017< λ <0.047 (2σ confidence level), by which we present the model's applicable parameter range.

  15. A framework for privacy and security analysis of probe-based traffic information systems

    KAUST Repository

    Canepa, Edward S.

    2013-01-01

    Most large scale traffic information systems rely on fixed sensors (e.g. loop detectors, cameras) and user generated data, this latter in the form of GPS traces sent by smartphones or GPS devices onboard vehicles. While this type of data is relatively inexpensive to gather, it can pose multiple security and privacy risks, even if the location tracks are anonymous. In particular, creating bogus location tracks and sending them to the system is relatively easy. This bogus data could perturb traffic flow estimates, and disrupt the transportation system whenever these estimates are used for actuation. In this article, we propose a new framework for solving a variety of privacy and cybersecurity problems arising in transportation systems. The state of traffic is modeled by the Lighthill-Whitham-Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for some decision variable. The resulting framework is very flexible, and can in particular be used to detect spoofing attacks in real time, or carry out attacks on location tracks. Numerical implementations are performed on experimental data from the Mobile Century experiment to validate this framework. © 2013 ACM.

  16. 77 FR 18247 - Request for Comments on Issues of Privacy and Access With Regard to Human Genome Sequence Data

    Science.gov (United States)

    2012-03-27

    .... Undertaking these duties, the Commission seeks to identify and examine specific bioethical, legal, and social... regards genomic information and evolving notions of privacy, as evidenced and influenced by social media; and models and mechanisms for protecting privacy, in both genetic/genomic databases and biobanks, but...

  17. Digression and Value Concatenation to Enable Privacy-Preserving Regression

    Science.gov (United States)

    Li, Xiao-Bai; Sarkar, Sumit

    2015-01-01

    Regression techniques can be used not only for legitimate data analysis, but also to infer private information about individuals. In this paper, we demonstrate that regression trees, a popular data-analysis and data-mining technique, can be used to effectively reveal individuals’ sensitive data. This problem, which we call a “regression attack,” has not been addressed in the data privacy literature, and existing privacy-preserving techniques are not appropriate in coping with this problem. We propose a new approach to counter regression attacks. To protect against privacy disclosure, our approach introduces a novel measure, called digression, which assesses the sensitive value disclosure risk in the process of building a regression tree model. Specifically, we develop an algorithm that uses the measure for pruning the tree to limit disclosure of sensitive data. We also propose a dynamic value-concatenation method for anonymizing data, which better preserves data utility than a user-defined generalization scheme commonly used in existing approaches. Our approach can be used for anonymizing both numeric and categorical data. An experimental study is conducted using real-world financial, economic and healthcare data. The results of the experiments demonstrate that the proposed approach is very effective in protecting data privacy while preserving data quality for research and analysis. PMID:26752802

  18. Insights to develop privacy policy for organization in Indonesia

    Science.gov (United States)

    Rosmaini, E.; Kusumasari, T. F.; Lubis, M.; Lubis, A. R.

    2018-03-01

    Nowadays, the increased utilization of shared application in the network needs not only dictate to have enhanced security but also emphasize the need to balance its privacy protection and ease of use. Meanwhile, its accessibility and availability as the demand from organization service put privacy obligations become more complex process to be handled and controlled. Nonetheless, the underlying principles for privacy policy exist in Indonesian current laws, even though they spread across various article regulations. Religions, constitutions, statutes, regulations, custom and culture requirements still become the reference model to control the activity process for data collection and information sharing accordingly. Moreover, as the customer and organization often misinterpret their responsibilities and rights in the business function, process and level, the essential thing to be considered for professionals on how to articulate clearly the rules that manage their information gathering and distribution in a manner that translates into information system specification and requirements for developers and managers. This study focus on providing suggestion and recommendation to develop privacy policy based on descriptive analysis of 791 respondents on personal data protection in accordance with political and economic factor in Indonesia.

  19. Customer privacy on UK healthcare websites.

    Science.gov (United States)

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  20. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  1. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  2. Interpersonal Privacy Management in Distributed Collaboration: Situational Characteristics and Interpretive Influences

    Science.gov (United States)

    Patil, Sameer; Kobsa, Alfred; John, Ajita; Brotman, Lynne S.; Seligmann, Doree

    To understand how collaborators reconcile the often conflicting needs of awareness and privacy, we studied a large software development project in a multinational corporation involving individuals at sites in the U.S. and India. We present a theoretical framework describing privacy management practices and their determinants that emerged from field visits, interviews, and questionnaire responses. The framework identifies five relevant situational characteristics: issue(s) under consideration, physical place(s) involved in interaction(s), temporal aspects, affordances and limitations presented by technology, and nature of relationships among parties. Each actor, in turn, interprets the situation based on several simultaneous influences: self, team, work site, organization, and cultural environment. This interpretation guides privacy management action(s). Past actions form a feedback loop refining and/or reinforcing the interpretive influences. The framework suggests that effective support for privacy management will require that designers follow a socio-technical approach incorporating a wider scope of situational and interpretive differences.

  3. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    Science.gov (United States)

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  4. Ductile failure analysis of high strength steel in hot forming based on micromechanical damage model

    Directory of Open Access Journals (Sweden)

    Ying Liang

    2016-01-01

    Full Text Available The damage evolution of high strength steel at elevated temperature is investigated by using the Gurson-Tvergaard-Needleman (GTN model. A hybrid method integrated thermal tensile test and numerical technique is employed to identify the damage parameters. The analysis results show that the damage parameters are different at different temperature as the variation of tested material microstructure. Furthermore, the calibrated damage parameters are implemented to simulate a bugling forming at elevated temperature. The experimental results show the availability of GTN damage model in analyzing sheet formability in hot forming.

  5. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  6. Digital privacy in the marketplace perspectives on the information exchange

    CERN Document Server

    Milne, George

    2015-01-01

    Digital Privacy in the Marketplace focuses on the data ex-changes between marketers and consumers, with special ttention to the privacy challenges that are brought about by new information technologies. The purpose of this book is to provide a background source to help the reader think more deeply about the impact of privacy issues on both consumers and marketers. It covers topics such as: why privacy is needed, the technological, historical and academic theories of privacy, how market exchange af-fects privacy, what are the privacy harms and protections available, and what is the likely future of privacy.

  7. Who commits virtual identity suicide? Differences in privacy concerns, Internet addiction, and personality between Facebook users and quitters.

    Science.gov (United States)

    Stieger, Stefan; Burger, Christoph; Bohn, Manuel; Voracek, Martin

    2013-09-01

    Social networking sites such as Facebook attract millions of users by offering highly interactive social communications. Recently, a counter movement of users has formed, deciding to leave social networks by quitting their accounts (i.e., virtual identity suicide). To investigate whether Facebook quitters (n=310) differ from Facebook users (n=321), we examined privacy concerns, Internet addiction scores, and personality. We found Facebook quitters to be significantly more cautious about their privacy, having higher Internet addiction scores, and being more conscientious than Facebook users. The main self-stated reason for committing virtual identity suicide was privacy concerns (48 percent). Although the adequacy of privacy in online communication has been questioned, privacy is still an important issue in online social communications.

  8. A tunable closed form model for the structure function of tropospheric delay

    DEFF Research Database (Denmark)

    Merryman Boncori, John Peter; Mohr, Johan Jacob

    2008-01-01

    Several interferometric synthetic aperture radar applications could benefit from the availability of a closed-form model for the second-order statistics of atmospheric delay. Due to the variability of the latter, it would also be desirable for the model to be tunable to some acquisition......-specific information, describing the atmospheric state. In this letter, a closed-form expression for the zenith delay structure function of tropospheric propagation delay is derived from a two-regime power spectral density function reported in the literature. The power at a specific spatial frequency is used as a free...... model parameter, which may be tuned to available measurements or, in the absence of these, to atmospheric statistics. The latter approach is used to compare the derived model with previously published results....

  9. (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems.

    Science.gov (United States)

    Li, Hongtao; Guo, Feng; Zhang, Wenyin; Wang, Jie; Xing, Jinsheng

    2018-02-14

    The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a 1 ,k 1 )-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a 1 ,k 1 )-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a 2 ,k 2 )-anonymity (a 1  ≥ a 2 , k 2  ≥ k 1 ). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.

  10. Mesomechanical aspects of computational modeling for non-homogeneous materials joined by forming

    Directory of Open Access Journals (Sweden)

    Yunan Prawoto

    2017-01-01

    Full Text Available The metal forming and joining industries are constantly evolving to adapt to new materials and alloys and to meet customers’ needs. However, the size of the companies in this segment is typically small. Therefore, the progress of the mesomechanical modeling on non-homogeneous materials is relatively slow. This article aims to contribute to the advancement of such computational idea. The industries and academics alike may benefit the mesomechanical aspects of computational modeling for materials joined by forming using the established theories known in the field of mechanics. It may be used as an introductory for the society of joining by forming. This article reviews the basic concept of the finite element method, the fundamental mechanics and highlights some common problems in joining by forming, namely contact problems, local variations and interfacial cracking. This article aims to disseminate the meso/micro-mechanics approach to the field of joining by forming, which currently is dominated by experimental works and macroscopic modeling. Using the simple approaches discussed in this article, researchers with little or no background in computational mechanics can implement the concepts.

  11. Local elastic expansion model for viscous-flow activation energies of glass-forming molecular liquids

    DEFF Research Database (Denmark)

    Dyre, Jeppe; Olsen, Niels Boye; Christensen, Tage Emil

    1996-01-01

    A model for the viscosity of glass-forming molecular liquids is proposed in which a "flow event" requires a local volume increase. The activation energy for a flow event is identified with the work done in shoving aside the surrounding liquid; this work is proportional to the high-frequency shear...... modulus, which increases as the temperature decreases. The model is confirmed by experiments on a number of molecular liquids....

  12. A method for the quantification of model form error associated with physical systems.

    Energy Technology Data Exchange (ETDEWEB)

    Wallen, Samuel P.; Brake, Matthew Robert

    2014-03-01

    In the process of model validation, models are often declared valid when the differences between model predictions and experimental data sets are satisfactorily small. However, little consideration is given to the effectiveness of a model using parameters that deviate slightly from those that were fitted to data, such as a higher load level. Furthermore, few means exist to compare and choose between two or more models that reproduce data equally well. These issues can be addressed by analyzing model form error, which is the error associated with the differences between the physical phenomena captured by models and that of the real system. This report presents a new quantitative method for model form error analysis and applies it to data taken from experiments on tape joint bending vibrations. Two models for the tape joint system are compared, and suggestions for future improvements to the method are given. As the available data set is too small to draw any statistical conclusions, the focus of this paper is the development of a methodology that can be applied to general problems.

  13. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?

    Science.gov (United States)

    Dhir, Amandeep; Torsheim, Torbjørn; Pallesen, Ståle; Andreassen, Cecilie S.

    2017-01-01

    Selfies, or self-portraits, are often taken and shared on social media for online self-presentation reasons, which are considered essential for the psychosocial development and well-being of people in today’s culture. Despite the growing popularity and widespread sharing of selfies in the online space, little is known about how privacy concerns moderate selfie behavior. In addition to this, it is also not known whether privacy concerns across age and gender groups influence selfie behavior. To address this timely issue, a survey assessing common selfie behaviors, that is, frequency of taking (individual and group selfies), editing (cropping and filtering), and posting selfies online, and social media privacy concerns (over personal data being accessed and misused by third parties) was conducted. The web-survey was administered to 3,763 Norwegian social media users, ranging from 13 to 50 years, with a preponderance of women (n = 2,509, 66.7%). The present study investigated the impact of privacy concerns on selfie behaviors across gender and age groups (adolescent, young adult, and adult) by use of the structural equation modeling approach. The results suggest that young adults have greater privacy concerns compared to adolescents and adults. Females have greater privacy concerns than males. Greater privacy concerns among female social media users were linked to lower engagement in selfie behavior, but privacy concerns did not influence selfie behavior in the case of male adolescents and young adults. Overall, privacy concerns were more consistently and inversely related to selfie behavior (taking and posting) among females than males. The study results have theoretical as well as practical implications for both researchers and policy makers. PMID:28588530

  14. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?

    Science.gov (United States)

    Dhir, Amandeep; Torsheim, Torbjørn; Pallesen, Ståle; Andreassen, Cecilie S

    2017-01-01

    Selfies, or self-portraits, are often taken and shared on social media for online self-presentation reasons, which are considered essential for the psychosocial development and well-being of people in today's culture. Despite the growing popularity and widespread sharing of selfies in the online space, little is known about how privacy concerns moderate selfie behavior. In addition to this, it is also not known whether privacy concerns across age and gender groups influence selfie behavior. To address this timely issue, a survey assessing common selfie behaviors, that is, frequency of taking (individual and group selfies), editing (cropping and filtering), and posting selfies online, and social media privacy concerns (over personal data being accessed and misused by third parties) was conducted. The web-survey was administered to 3,763 Norwegian social media users, ranging from 13 to 50 years, with a preponderance of women ( n = 2,509, 66.7%). The present study investigated the impact of privacy concerns on selfie behaviors across gender and age groups (adolescent, young adult, and adult) by use of the structural equation modeling approach. The results suggest that young adults have greater privacy concerns compared to adolescents and adults. Females have greater privacy concerns than males. Greater privacy concerns among female social media users were linked to lower engagement in selfie behavior, but privacy concerns did not influence selfie behavior in the case of male adolescents and young adults. Overall, privacy concerns were more consistently and inversely related to selfie behavior (taking and posting) among females than males. The study results have theoretical as well as practical implications for both researchers and policy makers.

  15. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?

    Directory of Open Access Journals (Sweden)

    Amandeep Dhir

    2017-05-01

    Full Text Available Selfies, or self-portraits, are often taken and shared on social media for online self-presentation reasons, which are considered essential for the psychosocial development and well-being of people in today’s culture. Despite the growing popularity and widespread sharing of selfies in the online space, little is known about how privacy concerns moderate selfie behavior. In addition to this, it is also not known whether privacy concerns across age and gender groups influence selfie behavior. To address this timely issue, a survey assessing common selfie behaviors, that is, frequency of taking (individual and group selfies, editing (cropping and filtering, and posting selfies online, and social media privacy concerns (over personal data being accessed and misused by third parties was conducted. The web-survey was administered to 3,763 Norwegian social media users, ranging from 13 to 50 years, with a preponderance of women (n = 2,509, 66.7%. The present study investigated the impact of privacy concerns on selfie behaviors across gender and age groups (adolescent, young adult, and adult by use of the structural equation modeling approach. The results suggest that young adults have greater privacy concerns compared to adolescents and adults. Females have greater privacy concerns than males. Greater privacy concerns among female social media users were linked to lower engagement in selfie behavior, but privacy concerns did not influence selfie behavior in the case of male adolescents and young adults. Overall, privacy concerns were more consistently and inversely related to selfie behavior (taking and posting among females than males. The study results have theoretical as well as practical implications for both researchers and policy makers.

  16. Friction and lubrication modeling in sheet metal forming simulations of a Volvo XC90 inner door

    Science.gov (United States)

    Sigvant, M.; Pilthammar, J.; Hol, J.; Wiebenga, J. H.; Chezan, T.; Carleer, B.; van den Boogaard, A. H.

    2016-11-01

    The quality of sheet metal formed parts is strongly dependent on the tribology, friction and lubrication conditions that are acting in the actual production process. Although friction is of key importance, it is currently not considered in detail in stamping simulations. This paper presents a selection of results considering friction and lubrication modeling in sheet metal forming simulations of the Volvo XC90 right rear door inner. For this purpose, the TriboForm software is used in combination with the AutoForm software. Validation of the simulation results is performed using door inner parts taken from the press line in a full-scale production run. The results demonstrate the improved prediction accuracy of stamping simulations by accounting for accurate friction and lubrication conditions, and the strong influence of friction conditions on both the part quality and the overall production stability.

  17. Bethe Ansatz and exact form factors of the O(N) Gross Neveu-model

    International Nuclear Information System (INIS)

    Babujian, Hrachya M.; Foerster, Angela; Karowski, Michael

    2016-01-01

    We apply previous results on the O(N) Bethe Ansatz http://dx.doi.org/10.1088/1751-8113/45/5/055207, http://arxiv.org/abs/1204.3479, http://dx.doi.org/10.1007/JHEP11(2013)089 to construct a general form factor formula for the O(N) Gross-Neveu model. We examine this formula for several operators, such as the energy momentum, the spin-field and the current. We also compare these results with the 1/N expansion of this model and obtain full agreement. We discuss bound state form factors, in particular for the three particle form factor of the field. In addition for the two particle case we prove a recursion relation for the K-functions of the higher level Bethe Ansatz.

  18. Strong nucleon and Δ-isobar form factors in the quark-confinement model

    International Nuclear Information System (INIS)

    Efimov, G.V.; Ivanov, M.A.; Lubovitskij, V.E.

    1989-01-01

    The nucleon and the Δ-isobar are investigated as three-quark systems in the quark-confinement model (QCM). This model is based on two hypotheses. First, quark confinement is accomplished through averaging over some vacuum gluon fields which are assumed to provide the confinement of any colour states. Second, hadrons are treated as collective colourless excitations of quark-gluon interactions. The QCM is applied to low-energy baryon physics. The nucleon magnetic moments and electromagnetic radii, the ratio G A /G V , and the decay width for Δ→pπ are calculated. The behaviour of the electromagnetic and strong meson-nucleon (meson-isobar) form factors is determined for space-like momentum transfers. The results are compared with experimental data for the electromagnetic form factors and phenomenological strong form factors as used in the Bonn potential. 32 refs.; 10 figs.; 4 tabs

  19. 16 CFR Appendix C to Part 698 - Model Forms for Affiliate Marketing Opt-Out Notices

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model Forms for Affiliate Marketing Opt-Out...-Affiliate Notice) [Your Choice to Limit Marketing]/[Marketing Opt-out] — [Name of Affiliate] is providing... marketing from our affiliates.] — You may limit our affiliates in the [ABC] group of companies, such as our...

  20. Teachers and Peers as Communication Models to Teach Grammatical Forms to Preschoolers with Hearing Loss

    Science.gov (United States)

    Richels, Corrin G.; Bobzien, Jonna L.; Schwartz, Kathryn S.; Raver, Sharon A.; Browning, Ellen L.; Hester, Peggy P.

    2016-01-01

    Structured input from both teachers and peers maximizes the opportunities for preschoolers to learn grammatical forms. The purpose of this pilot study was to evaluate the effectiveness of using a teacher and a peer with typical hearing and language skills to model grammatically correct verbal responses to action "wh-" questions…

  1. Modeling Multiple Human-Automation Distributed Systems using Network-form Games

    Science.gov (United States)

    Brat, Guillaume

    2012-01-01

    The paper describes at a high-level the network-form game framework (based on Bayes net and game theory), which can be used to model and analyze safety issues in large, distributed, mixed human-automation systems such as NextGen.

  2. A Range-Based Test for the Parametric Form of the Volatility in Diffusion Models

    DEFF Research Database (Denmark)

    Podolskij, Mark; Ziggel, Daniel

    We propose a new test for the parametric form of the volatility function in continuous time diffusion models of the type dXt = a(t;Xt)dt + (t;Xt)dWt. Our approach involves a range-based estimation of the integrated volatility and the integrated quarticity, which are used to construct the test...

  3. A Range-Based Test for the Parametric Form of the Volatility in Diffusion Models

    DEFF Research Database (Denmark)

    Podolskij, Mark; Ziggel, Daniel

    We propose a new test for the parametric form of the volatility function in continuous time diffusion models of the type dXt = a(t,Xt)dt + s(t,Xt)dWt. Our approach involves a range-based estimation of the integrated volatility and the integrated quarticity, which are used to construct the test...

  4. A Dislocation based Constitutive Model for Warm Forming of Aluminum Sheet

    NARCIS (Netherlands)

    Kurukuri, S.; Ghosh, M.; van den Boogaard, Antonius H.

    2008-01-01

    The formability of aluminum sheet can be improved considerably by increasing the temperature. At elevated temperatures, the mechanical response of the material becomes strain rate dependent. To accurately simulate warm forming of aluminum sheet, a material model is required that incorporates the

  5. The Dilemma - The creation of Forms via Digital or manual models

    DEFF Research Database (Denmark)

    Thomsen, Bente Dahl; Chraudin, Marianna

    2008-01-01

    3D CAD sculpturing with subsequent printing or milling of physical models is becoming increasingly popular amongst university students and graduated designers. Thus this article raises the very pertinent question: If central parts of the process of form creation are solely based on 3D CAD...

  6. Simulation of Forming Process as an Educational Tool Using Physical Modeling

    Science.gov (United States)

    Abdullah, A. B.; Muda, M. R.; Samad, Z.

    2008-01-01

    Metal forming process simulation requires a very high cost including the cost for dies, machine and material and tight process control since the process involve very huge pressure. A physical modeling technique is developed and initiates a new era of educational tool of simulating the process effectively. Several publications and findings have…

  7. Learning Model and Form of Assesment toward the Inferensial Statistical Achievement by Controlling Numeric Thinking Skills

    Science.gov (United States)

    Widiana, I. Wayan; Jampel, I. Nyoman

    2016-01-01

    This study aimed to find out the effect of learning model and form of assessment toward inferential statistical achievement after controlling numeric thinking skills. This study was quasi experimental study with 130 students as the sample. The data analysis used ANCOVA. After controlling numeric thinking skills, the result of this study show that:…

  8. DEVELOPMENT OF MODEL FOR QUANTITATIVE EVALUATION OF DYNAMICALLY STABLE FORMS OF RIVER CHANNELS

    Directory of Open Access Journals (Sweden)

    O. V. Zenkin

    2017-01-01

    Full Text Available The article highlights the method of calculating the optimum curvature of the river channels using the kinematic model of the flow structure based on the concept of discrete nature of the channel process. It offers the analytic form of the equation of motion of river flow, which can be used simulation modeling for searching dynamically stable form of the river channel, and which can control water level in rivers. The source data for the illustrations of given in the article modeling methods have been served the images received from MODIS on the Terra satellite, for the lower reaches of the river Kur, which merges with the river Urmi, forming the Tunguska river – the left tributary of the Amur.The modified geometric method can be used to calculate obliquity of tangent to the curve and normal in those situations when observed on satellite imagery points are located on the coordinate of the network irregularly and when three points lying on the curve of the riverbed do not form isosceles triangle.The model assembles tangential and radial components of the forces acting on the water flow (centrifugal, friction and gravity. Curvature radius is explicitly expressed in the model through the parameter  – gradient angle relative to the axis X. As solution for the value of the angle  is searched, when the correlation function reaches its maximum. It is assumed that the riverbed shape “wrong” and could be modified so that the resulting curve better correlated with calculated curve. Morphometric dependences for macroforms allow creating series of morphological methods for the calculation of deformations and displacement of the shore in any section of meander scroll.The proposed technique has been tested also on satellite imagery of high resolution. The presented methods of calculation are used as the basis for hydrological projects of geoinformation systems oriented at prediction of morphodynamic processes and morphological evolution of river

  9. Privacy-preserving smart meter control strategy including energy storage losses

    OpenAIRE

    Avula, Chinni Venkata Ramana R.; Oechtering, Tobias J.; Månsson, Daniel

    2018-01-01

    Privacy-preserving smart meter control strategies proposed in the literature so far make some ideal assumptions such as instantaneous control without delay, lossless energy storage systems etc. In this paper, we present a one-step-ahead predictive control strategy using Bayesian risk to measure and control privacy leakage with an energy storage system. The controller estimates energy state using a three-circuit energy storage model to account for steady-state energy losses. With numerical exp...

  10. Personal Information Request Form

    International Development Research Centre (IDRC) Digital Library (Canada)

    PC Forms Inc. 834-4048

    Request Form. Head Office / Siège : PO Box / CP 8500, Ottawa, ON, Canada K1G 3H9 www.idrc.ca www.crdi.ca. (150 Kent Street, Constitution Square / 150, rue Kent, Complexe Constitution Square). Phone / Tél. : 613-236-6163, ext./poste 2348 Fax / Téléc. : 613-565-8212 Email / Courriel : ATIP-AIPRP@idrc.ca. Privacy Act.

  11. Simulation of hot forming processes of refractory metals using porous metal plasticity models

    International Nuclear Information System (INIS)

    Parteder, E.; Riedel, H.; Sun, D.-Z.

    2001-01-01

    In this work two models for predicting the densification behavior of sintered refractory metals during hot working operations are presented. It is known from experiments and cell model calculations that the pore shape change has a significant influence on the densification behavior. Therefore this effect should be included in a continuum constitutive description. The first model presented is a phenomenological extension of the Gurson model, the second one is the model of Gologanu, Leblond and Devaux, which was implemented as a user material model into the finite-element-code ABAQUS. The numerical results are compared with the density distribution of a tapered disk made of pure molybdenum after the hot forming operation. (author)

  12. Contemporary Privacy Theory Contributions to Learning Analytics

    Science.gov (United States)

    Heath, Jennifer

    2014-01-01

    With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems…

  13. 75 FR 22577 - Proposed Privacy Policy Statement

    Science.gov (United States)

    2010-04-29

    ... request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99- 18.... These statements are intended to inform the public of government- wide policies and how each agency...

  14. Encrypted Signal Processing for Privacy Protection

    NARCIS (Netherlands)

    Cavallaro, A.; Lagendijk, R. (Inald) L.; Erkin, Zekeriya; Erkin, Zekeriya; Kwasinski, A.; Barni, Mauro

    In recent years, signal processing applications that deal with user-related data have aroused privacy concerns. For instance, face recognition and personalized recommendations rely on privacy-sensitive information that can be abused if the signal processing is executed on remote servers or in the

  15. Efficient Utility Improvement for Location Privacy

    Directory of Open Access Journals (Sweden)

    Chatzikokolakis Konstantinos

    2017-10-01

    Full Text Available The continuously increasing use of location-based services poses an important threat to the privacy of users. A natural defense is to employ an obfuscation mechanism, such as those providing geo-indistinguishability, a framework for obtaining formal privacy guarantees that has become popular in recent years.

  16. Privacy and Ethics in Undergraduate GIS Curricula

    Science.gov (United States)

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  17. Privacy-Preserving Location-Based Services

    Science.gov (United States)

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  18. Privacy and Psychosomatic Stress: An Empirical Analysis.

    Science.gov (United States)

    Webb, Stephen D.

    1978-01-01

    Examines the supposition that insufficient privacy is stressful to the individual. Data were obtained from urban centers in New Zealand. Findings support the hypothesis that a percieved lack of privacy is associated with psychosomatic stress. The relationship is specified by measures of stress and sex of respondents. (Author)

  19. Just in Time Research: Privacy Practices

    Science.gov (United States)

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  20. Revocable privacy: Principles, use cases, and technologies

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Security and privacy often seem to be at odds with one another. In this paper, we revisit the design principle of revocable privacy which guides the creation of systems that offer anonymity for people who do not violate a predefined rule, but can still have consequences for people who do violate the

  1. Online privacy: overview and preliminary research

    Directory of Open Access Journals (Sweden)

    Renata Mekovec

    2010-12-01

    Full Text Available Normal 0 21 false false false HR X-NONE X-NONE MicrosoftInternetExplorer4 Over the last decade using the Internet for online shopping, information browsing and searching as well as for online communication has become part of everyday life. Although the Internet technology has a lot of benefits for users, one of the most important disadvantages is related to the increasing capacity for users’ online activity surveillance. However, the users are increasingly becoming aware of online surveillance methods, which results in their increased concern for privacy protection. Numerous factors influence the way in which individuals perceive the level of privacy protection when they are online. This article provides a review of factors that influence the privacy perception of Internet users. Previous online privacy research related to e-business was predominantly focused on the dimension of information privacy and concerned with the way users’ personal information is collected, saved and used by an online company. This article’s main aim is to provide an overview of numerous Internet users’ privacy perception elements across various privacy dimensions as well as their potential categorization. In addition, considering that e-banking and online shopping are one of the most widely used e-services, an examination of online privacy perception of e-banking/online shopping users was performed. 

  2. Towards quantum-based privacy and voting

    International Nuclear Information System (INIS)

    Hillery, Mark; Ziman, Mario; Buzek, Vladimir; Bielikova, Martina

    2006-01-01

    The privacy of communicating participants is often of paramount importance, but in some situations it is an essential condition. A typical example is a fair (secret) voting. We analyze in detail communication privacy based on quantum resources, and we propose new quantum protocols. Possible generalizations that would lead to voting schemes are discussed

  3. Virtue, Privacy and Self-Determination

    DEFF Research Database (Denmark)

    Stamatellos, Giannis

    2011-01-01

    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user...

  4. COUPLED ATOMIZATION AND SPRAY MODELLING IN THE SPRAY FORMING PROCESS USING OPENFOAM

    DEFF Research Database (Denmark)

    Gjesing, Rasmus; Hattel, Jesper Henri; Fritsching, Udo

    2009-01-01

    The paper presents a numerical model capable of simulating the atomization, break-up and in-flight spray phenomena in the spray forming process. The model is developed and implemented in the freeware code openFOAM. The focus is on studying the coupling effect of the melt break-up phenomena...... with the local gas and droplets flow fields. The work is based on an Eulerian-Lagrangian description, which is implemented in a full 3D representation. The gas is described by the incompressible RANS equations, whereas the movement of the droplets is modeled by a tracking approach, together with a full thermal...

  5. Mathematical modelling of the corrosion and leaching behaviour of cemented waste forms

    International Nuclear Information System (INIS)

    Kienzler, B.

    1985-05-01

    A theoretical model is presented which allows to calculate the leaching of radionuclides and the corrosion of cemented waste forms in contact with water or brine. The model computes both the behaviour of specimens in laboratory-scale experiments and provides a forecast of the behaviour of waste forms in the case of an accidental drowning of a repository. The mathematical formalism employed describes leaching and corrosion on the basis of diffusion and dissolution processes and of chemical reactions. The mathematical formalism is coded in FORTRAN77. This report includes the documentation of the 'DIFMOD' computer code with the associated 'DIFPLO' plot program and the input manual of both programs. Finally application of the model is demonstrated by some examples allowing interpretation of experimental data. (orig.) [de

  6. Protecting privacy in data release

    CERN Document Server

    Livraga, Giovanni

    2015-01-01

    This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsou

  7. Enforcing Privacy in Cloud Databases

    OpenAIRE

    Moghadam, Somayeh Sobati; Darmont, Jérôme; Gavin, Gérald

    2017-01-01

    International audience; Outsourcing databases, i.e., resorting to Database-as-a-Service (DBaaS), is nowadays a popular choice due to the elasticity, availability, scalability and pay-as-you-go features of cloud computing. However, most data are sensitive to some extent, and data privacy remains one of the top concerns to DBaaS users, for obvious legal and competitive reasons.In this paper, we survey the mechanisms that aim at making databases secure in a cloud environment, and discuss current...

  8. Modelling and simulating the forming of new dry automated lay-up reinforcements for primary structures

    Science.gov (United States)

    Bouquerel, Laure; Moulin, Nicolas; Drapier, Sylvain; Boisse, Philippe; Beraud, Jean-Marc

    2017-10-01

    While weight has been so far the main driver for the development of prepreg based-composites solutions for aeronautics, a new weight-cost trade-off tends to drive choices for next-generation aircrafts. As a response, Hexcel has designed a new dry reinforcement type for aircraft primary structures, which combines the benefits of automation, out-of-autoclave process cost-effectiveness, and mechanical performances competitive to prepreg solutions: HiTape® is a unidirectional (UD) dry carbon reinforcement with thermoplastic veil on each side designed for aircraft primary structures [1-3]. One privileged process route for HiTape® in high volume automated processes consists in forming initially flat dry reinforcement stacks, before resin infusion [4] or injection. Simulation of the forming step aims at predicting the geometry and mechanical properties of the formed stack (so-called preform) for process optimisation. Extensive work has been carried out on prepreg and dry woven fabrics forming behaviour and simulation, but the interest for dry non-woven reinforcements has emerged more recently. Some work has been achieved on non crimp fabrics but studies on the forming behaviour of UDs are seldom and deal with UD prepregs only. Tension and bending in the fibre direction, along with inter-ply friction have been identified as the main mechanisms controlling the HiTape® response during forming. Bending has been characterised using a modified Peirce's flexometer [5] and inter-ply friction study is under development. Anisotropic hyperelastic constitutive models have been selected to represent the assumed decoupled deformation mechanisms. Model parameters are then identified from associated experimental results. For forming simulation, a continuous approach at the macroscopic scale has been selected first, and simulation is carried out in the Zset framework [6] using proper shell finite elements.

  9. A method of LED free-form tilted lens rapid modeling based on scheme language

    Science.gov (United States)

    Dai, Yidan

    2017-10-01

    According to nonimaging optical principle and traditional LED free-form surface lens, a new kind of LED free-form tilted lens was designed. And a method of rapid modeling based on Scheme language was proposed. The mesh division method was applied to obtain the corresponding surface configuration according to the character of the light source and the desired energy distribution on the illumination plane. Then 3D modeling software and the Scheme language programming are used to generate lens model respectively. With the help of optical simulation software, a light source with the size of 1mm*1mm*1mm in volume is used in experiment, and the lateral migration distance of illumination area is 0.5m, in which total one million rays are computed. We could acquire the simulated results of both models. The simulated output result shows that the Scheme language can prevent the model deformation problems caused by the process of the model transfer, and the degree of illumination uniformity is reached to 82%, and the offset angle is 26°. Also, the efficiency of modeling process is greatly increased by using Scheme language.

  10. Piecewise Function Hysteretic Model for Cold-Formed Steel Shear Walls with Reinforced End Studs

    Directory of Open Access Journals (Sweden)

    Jihong Ye

    2017-01-01

    Full Text Available Cold-formed steel (CFS shear walls with concrete-filled rectangular steel tube (CFRST columns as end studs can upgrade the performance of mid-rise CFS structures, such as the vertical bearing capacity, anti-overturning ability, shear strength, and fire resistance properties, thereby enhancing the safety of structures. A theoretical hysteretic model is established according to a previous experimental study. This model is described in a simple mathematical form and takes nonlinearity, pinching, strength, and stiffness deterioration into consideration. It was established in two steps: (1 a discrete coordinate method was proposed to determine the load-displacement skeleton curve of the wall, by which governing deformations and their corresponding loads of the hysteretic loops under different loading cases can be obtained; afterwards; (2 a piecewise function was adopted to capture the hysteretic loop relative to each governing deformation, the hysteretic model of the wall was further established, and additional criteria for the dominant parameters of the model were stated. Finally, the hysteretic model was validated by experimental results from other studies. The results show that elastic lateral stiffness Ke and shear capacity Fp are key factors determining the load-displacement skeleton curve of the wall; hysteretic characteristics of the wall with reinforced end studs can be fully reflected by piecewise function hysteretic model, moreover, the model has intuitional expressions with clear physical interpretations for each parameter, paving the way for predicting the nonlinear dynamic responses of mid-rise CFS structures.

  11. Modeling and optimization of surface roughness in single point incremental forming process

    Directory of Open Access Journals (Sweden)

    Suresh Kurra

    2015-07-01

    Full Text Available Single point incremental forming (SPIF is a novel and potential process for sheet metal prototyping and low volume production applications. This article is focuses on the development of predictive models for surface roughness estimation in SPIF process. Surface roughness in SPIF has been modeled using three different techniques namely, Artificial Neural Networks (ANN, Support Vector Regression (SVR and Genetic Programming (GP. In the development of these predictive models, tool diameter, step depth, wall angle, feed rate and lubricant type have been considered as model variables. Arithmetic mean surface roughness (Ra and maximum peak to valley height (Rz are used as response variables to assess the surface roughness of incrementally formed parts. The data required to generate, compare and evaluate the proposed models have been obtained from SPIF experiments performed on Computer Numerical Control (CNC milling machine using Box–Behnken design. The developed models are having satisfactory goodness of fit in predicting the surface roughness. Further, the GP model has been used for optimization of Ra and Rz using genetic algorithm. The optimum process parameters for minimum surface roughness in SPIF have been obtained and validated with the experiments and found highly satisfactory results within 10% error.

  12. Virtue, Privacy and Self-Determination

    DEFF Research Database (Denmark)

    Stamatellos, Giannis

    2011-01-01

    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user......’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal data. However, scant attention has been paid on a virtue ethics approach of information privacy. Plotinus’ discussion of self......-determination is related to ethical virtue, human freedom and intellectual autonomy. The Plotinian virtue ethics approach of self-determination is not primarily related to the sphere of moral action, but to the quality of the self prior to moral practice. In this paper, it is argued that the problem of information privacy...

  13. Protecting privacy in a clinical data warehouse.

    Science.gov (United States)

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.

  14. Is the Linear Modeling Technique Good Enough for Optimal Form Design? A Comparison of Quantitative Analysis Models

    Science.gov (United States)

    Lin, Yang-Cheng; Yeh, Chung-Hsing; Wang, Chen-Cheng; Wei, Chun-Chun

    2012-01-01

    How to design highly reputable and hot-selling products is an essential issue in product design. Whether consumers choose a product depends largely on their perception of the product image. A consumer-oriented design approach presented in this paper helps product designers incorporate consumers' perceptions of product forms in the design process. The consumer-oriented design approach uses quantification theory type I, grey prediction (the linear modeling technique), and neural networks (the nonlinear modeling technique) to determine the optimal form combination of product design for matching a given product image. An experimental study based on the concept of Kansei Engineering is conducted to collect numerical data for examining the relationship between consumers' perception of product image and product form elements of personal digital assistants (PDAs). The result of performance comparison shows that the QTTI model is good enough to help product designers determine the optimal form combination of product design. Although the PDA form design is used as a case study, the approach is applicable to other consumer products with various design elements and product images. The approach provides an effective mechanism for facilitating the consumer-oriented product design process. PMID:23258961

  15. Is the Linear Modeling Technique Good Enough for Optimal Form Design? A Comparison of Quantitative Analysis Models

    Directory of Open Access Journals (Sweden)

    Yang-Cheng Lin

    2012-01-01

    Full Text Available How to design highly reputable and hot-selling products is an essential issue in product design. Whether consumers choose a product depends largely on their perception of the product image. A consumer-oriented design approach presented in this paper helps product designers incorporate consumers’ perceptions of product forms in the design process. The consumer-oriented design approach uses quantification theory type I, grey prediction (the linear modeling technique, and neural networks (the nonlinear modeling technique to determine the optimal form combination of product design for matching a given product image. An experimental study based on the concept of Kansei Engineering is conducted to collect numerical data for examining the relationship between consumers’ perception of product image and product form elements of personal digital assistants (PDAs. The result of performance comparison shows that the QTTI model is good enough to help product designers determine the optimal form combination of product design. Although the PDA form design is used as a case study, the approach is applicable to other consumer products with various design elements and product images. The approach provides an effective mechanism for facilitating the consumer-oriented product design process.

  16. Art form as an object of cognitive modeling (towards development of Vygotsky`s semiotic model)

    Energy Technology Data Exchange (ETDEWEB)

    Dmitriev, V. [Oklahoma State Univ. (United States); Perlovsky, L.I.

    1996-12-31

    We suggest a further development of Vygotsky`s esthetic-semiotic model. First, we discuss Vygotsky`s model originally developed for the analysis of Ivan Bunin`s story {open_quotes}Light Breath{close_quotes}. Vygotsky analyzes formal methods used by Bunin to achieve a specific esthetic effect of {open_quote}lightness{close_quotes} while describing {open_quotes}dirty{close_quotes} events of everyday life. According to Vygotsky, this effect is achieved by ordering of events in a non-linear fashion. Vygotsky creams an airy pattern of smooth lines connecting events of story that he first orders linearly in time. And, he insists that this airy pattern creates an impression of airy lightness. In the language of semiotics, the esthetic effect is created by a specific structural organization of signs. Second, we present our critique of Vygotsky`s model. Although, we do not agree with Vygotsky`s sometimes moralistic judgements, and we consider the dynamics between inner personal values and received moral values to be more complicated than implied in his judgements, our critique in this paper is limited to the structure of his semiotic model. We emphasize that Vygotsky`s model does not explicitly account for a hierarchy of multiple levels of semiotic analysis. His analysis regularly slips from one level to another: (1) a lever of cognitive perception by a regular reader is confused with a level of creative genius of a writer; (2) {open_quotes}open{close_quotes} time of real world is mixed up with {open_quote}closed{close_quote} time of the story; (3) events are not organized by the hierarchy of their importance, nor in real world, nor in the inner model of the personages, nor in the story.

  17. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    Science.gov (United States)

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  18. On the comprehensibility and perceived privacy protection of indirect questioning techniques.

    Science.gov (United States)

    Hoffmann, Adrian; Waubert de Puiseau, Berenike; Schmidt, Alexander F; Musch, Jochen

    2017-08-01

    On surveys that assess sensitive personal attributes, indirect questioning aims at increasing respondents' willingness to answer truthfully by protecting confidentiality. However, the assumption that subjects understand questioning procedures fully and trust them to protect their privacy is rarely tested. In a scenario-based design, we compared four indirect questioning procedures in terms of their comprehensibility and perceived privacy protection. All indirect questioning techniques were found to be less comprehensible by respondents than a conventional direct question used for comparison. Less-educated respondents experienced more difficulties when confronted with any indirect questioning technique. Regardless of education, the crosswise model was found to be the most comprehensible among the four indirect methods. Indirect questioning in general was perceived to increase privacy protection in comparison to a direct question. Unexpectedly, comprehension and perceived privacy protection did not correlate. We recommend assessing these factors separately in future evaluations of indirect questioning.

  19. Promotion time cure rate model with nonparametric form of covariate effects.

    Science.gov (United States)

    Chen, Tianlei; Du, Pang

    2018-05-10

    Survival data with a cured portion are commonly seen in clinical trials. Motivated from a biological interpretation of cancer metastasis, promotion time cure model is a popular alternative to the mixture cure rate model for analyzing such data. The existing promotion cure models all assume a restrictive parametric form of covariate effects, which can be incorrectly specified especially at the exploratory stage. In this paper, we propose a nonparametric approach to modeling the covariate effects under the framework of promotion time cure model. The covariate effect function is estimated by smoothing splines via the optimization of a penalized profile likelihood. Point-wise interval estimates are also derived from the Bayesian interpretation of the penalized profile likelihood. Asymptotic convergence rates are established for the proposed estimates. Simulations show excellent performance of the proposed nonparametric method, which is then applied to a melanoma study. Copyright © 2018 John Wiley & Sons, Ltd.

  20. CANADA – SUPPLIER, TAX AND BANK INFORMATION FORM

    International Development Research Centre (IDRC) Digital Library (Canada)

    Hakan Mustafa

    I am an authorized officer for the purpose of completing this form. I authorize the IDRC to deposit by electronic funds transfer to the bank account designated ... General Principles of our Privacy Policy. IDRC is committed to protect the privacy of its suppliers' information. IDRC gathers specific personal information that you ...

  1. Evaluating GPS Station Trajectory Models for Postseismic Transient Deformation: Logarithmic Versus Exponential Forms

    Science.gov (United States)

    Sobrero, F. S.; Bevis, M. G.; Bedford, J. R.; Gomez, D.; Brown, A.; Wang, F.

    2017-12-01

    Simple or multiple timescale transient models for postseismic transient displacements can be formulated using logarithmic and exponential decay formulas. The logarithmic form is associated with rate and state friction theory and afterslip, while the exponential form is associated with bulk viscoelastic relaxation of coseismic stresses. Many theorists have suggested that afterslip will be the dominant driver of postseismic displacement transients in the months and perhaps even years following an earthquake, but viscoelastic relaxation will eventually dominate. It is now quite widely understood that one can model GPS time series manifesting postseismic transient displacements almost equally well using trajectory models constructed using logarithmic or exponential transients. This is consistent with the consensus established by the late 1970's that it is difficult to use geodetic observations to distinguish between deep aseismic afterslip and more diffuse viscoelastic relaxation as the primary mechanism of postseismic deformation. We assess the relative explanatory value of both logarithmic and exponential forms by focusing on GPS time series measured with better than typical signal-to-noise ratios. We find that the logarithmic transient typically provides slightly better fits than exponential transients, when both models are given equal degrees of freedom. We will also discuss the relative utility of the hybrid transient formulas in which the logarithmic component is assigned shorter decay time scale parameters than the exponential component.

  2. Friction and lubrication modelling in sheet metal forming simulations of the Volvo XC90 inner door

    Science.gov (United States)

    Sigvant, M.; Pilthammar, J.; Hol, J.; Wiebenga, J. H.; Chezan, T.; Carleer, B.; van den Boogaard, A. H.

    2016-08-01

    The quality of sheet metal formed parts is strongly dependent on the friction and lubrication conditions that are acting in the actual production process. Although friction is of key importance, it is currently not considered in detail in stamping simulations. This paper presents project results considering friction and lubrication modelling in stamping simulations of the Volvo XC90 inner door. For this purpose, the TriboForm software is used in combination with the AutoForm software. Validation of the simulation results is performed based on door-inner parts taken from the press line in a full-scale production run. The project results demonstrate the improved prediction accuracy of stamping simulations.

  3. Control of interior surface materials for speech privacy in high-speed train cabins.

    Science.gov (United States)

    Jang, H S; Lim, H; Jeon, J Y

    2017-05-01

    The effect of interior materials with various absorption coefficients on speech privacy was investigated in a 1:10 scale model of one high-speed train cabin geometry. The speech transmission index (STI) and privacy distance (r P ) were measured in the train cabin to quantify speech privacy. Measurement cases were selected for the ceiling, sidewall, and front and back walls and were classified as high-, medium- and low-absorption coefficient cases. Interior materials with high absorption coefficients yielded a low r P , and the ceiling had the largest impact on both the STI and r P among the interior elements. Combinations of the three cases were measured, and the maximum reduction in r P by the absorptive surfaces was 2.4 m, which exceeds the space between two rows of chairs in the high-speed train. Additionally, the contribution of the interior elements to speech privacy was analyzed using recorded impulse responses and a multiple regression model for r P using the equivalent absorption area. The analysis confirmed that the ceiling was the most important interior element for improving speech privacy. These results can be used to find the relative decrease in r P in the acoustic design of interior materials to improve speech privacy in train cabins. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  4. A path model of different forms of impulsivity with externalizing and internalizing psychopathology: Towards greater specificity.

    Science.gov (United States)

    Johnson, Sheri L; Tharp, Jordan A; Peckham, Andrew D; Carver, Charles S; Haase, Claudia M

    2017-09-01

    A growing empirical literature indicates that emotion-related impulsivity (compared to impulsivity that is unrelated to emotion) is particularly relevant for understanding a broad range of psychopathologies. Recent work, however, has differentiated two forms of emotion-related impulsivity: A factor termed Pervasive Influence of Feelings captures tendencies for emotions (mostly negative emotions) to quickly shape thoughts, and a factor termed Feelings Trigger Action captures tendencies for positive and negative emotions to quickly and reflexively shape behaviour and speech. This study used path modelling to consider links from emotion-related and non-emotion-related impulsivity to a broad range of psychopathologies. Undergraduates completed self-report measures of impulsivity, depression, anxiety, aggression, and substance use symptoms. A path model (N = 261) indicated specificity of these forms of impulsivity. Pervasive Influence of Feelings was related to anxiety and depression, whereas Feelings Trigger Action and non-emotion-related impulsivity were related to aggression and substance use. The findings of this study suggest that emotion-relevant impulsivity could be a potentially important treatment target for a set of psychopathologies. Recent work has differentiated two forms of emotion-related impulsivity. This study tests a multivariate path model linking emotion-related and non-emotion-related impulsivity with multiple forms of psychopathology. Impulsive thoughts in response to negative emotions were related to anxiety and depression. Impulsive actions in response to emotions were related to aggression and substance use, as did non-emotion-related impulsivity. The study was limited by the reliance on self-report measures of impulsivity and psychopathology. There is a need for longitudinal work on how these forms of impulsivity predict the onset and course of psychopathology. © 2017 The British Psychological Society.

  5. Re-modeling Chara action potential: II. The action potential form under salinity stress

    Directory of Open Access Journals (Sweden)

    Mary Jane Beilby

    2017-04-01

    Full Text Available In part I we established Thiel-Beilby model of the Chara action potential (AP. In part II the AP is investigated in detail at the time of saline stress. Even very short exposure of salt-sensitive Chara cells to artificial pond water with 50 mM NaCl (Saline APW modified the AP threshold and drastically altered the AP form. Detailed modeling of 14 saline APs from 3 cells established that both the Ca2+ pump and the Ca2+ channels on internal stores seem to be affected, with the changes sometimes cancelling and sometimes re-enforcing each other, leading to APs with long durations and very complex forms. The exposure to salinity offers further insights into AP mechanism and suggests future experiments. The prolonged APs lead to greater loss of chloride and potassium ions, compounding the effects of saline stress.

  6. Fourteen Reasons Privacy Matters: A Multidisciplinary Review of Scholarly Literature

    Science.gov (United States)

    Magi, Trina J.

    2011-01-01

    Librarians have long recognized the importance of privacy to intellectual freedom. As digital technology and its applications advance, however, efforts to protect privacy may become increasingly difficult. With some users behaving in ways that suggest they do not care about privacy and with powerful voices claiming that privacy is dead, librarians…

  7. Digital Privacy: Toward a New Politics and Discursive Practice.

    Science.gov (United States)

    Doty, Philip

    2001-01-01

    Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…

  8. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Science.gov (United States)

    2012-05-25

    ... SECURITY Office of the Secretary Public Workshop: Privacy Compliance Workshop AGENCY: Privacy Office, DHS. ACTION: Notice Announcing Public Workshop. SUMMARY: The Department of Homeland Security Privacy Office will host a public workshop, ``Privacy Compliance Workshop.'' DATES: The workshop will be held on June...

  9. 75 FR 28051 - Public Workshop: Pieces of Privacy

    Science.gov (United States)

    2010-05-19

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Pieces of Privacy AGENCY: Privacy Office, DHS. ACTION: Notice announcing public workshop. SUMMARY: The Department of Homeland Security Privacy Office will host a public workshop, ``Pieces of Privacy.'' DATES: The workshop will be...

  10. 45 CFR 503.2 - General policies-Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  11. 25 CFR 700.259 - Records subject to Privacy Act.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as that...

  12. 43 CFR 2.47 - Records subject to Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Records subject to Privacy Act. 2.47 Section 2.47 Public Lands: Interior Office of the Secretary of the Interior RECORDS AND TESTIMONY; FREEDOM OF INFORMATION ACT Privacy Act § 2.47 Records subject to Privacy Act. The Privacy Act applies to all...

  13. 45 CFR 503.1 - Definitions-Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  14. Privacy Issues of a National Research and Education Network.

    Science.gov (United States)

    Katz, James E.; Graveman, Richard F.

    1991-01-01

    Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…

  15. Prompt form of relativistic equations of motion in a model of singular lagrangian formalism

    International Nuclear Information System (INIS)

    Gajda, R.P.; Duviryak, A.A.; Klyuchkovskij, Yu.B.

    1983-01-01

    The purpose of the paper is to develope the way of transition from equations of motion in singular lagrangian formalism to three-dimensional equations of Newton type in the prompt form of dynamics in the framework of c -2 parameter expansion (s. c. quasireltativistic approaches), as well as to find corresponding integrals of motion. The first quasirelativistifc approach for Dominici, Gomis, Longhi model was obtained and investigated

  16. Modelling and simulation of the consolidation behavior during thermoplastic prepreg composites forming process

    Science.gov (United States)

    Xiong, H.; Hamila, N.; Boisse, P.

    2017-10-01

    Pre-impregnated thermoplastic composites have recently attached increasing interest in the automotive industry for their excellent mechanical properties and their rapid cycle manufacturing process, modelling and numerical simulations of forming processes for composites parts with complex geometry is necessary to predict and optimize manufacturing practices, especially for the consolidation effects. A viscoelastic relaxation model is proposed to characterize the consolidation behavior of thermoplastic prepregs based on compaction tests with a range of temperatures. The intimate contact model is employed to predict the evolution of the consolidation which permits the microstructure prediction of void presented through the prepreg. Within a hyperelastic framework, several simulation tests are launched by combining a new developed solid shell finite element and the consolidation models.

  17. A porous flow model for the geometrical form of volcanoes - Critical comments

    Science.gov (United States)

    Wadge, G.; Francis, P.

    1982-01-01

    A critical evaluation is presented of the assumptions on which the mathematical model for the geometrical form of a volcano arising from the flow of magma in a porous medium of Lacey et al. (1981) is based. The lack of evidence for an equipotential surface or its equivalent in volcanoes prior to eruption is pointed out, and the preference of volcanic eruptions for low ground is attributed to the local stress field produced by topographic loading rather than a rising magma table. Other difficulties with the model involve the neglect of the surface flow of lava under gravity away from the vent, and the use of the Dupuit approximation for unconfined flow and the assumption of essentially horizontal magma flow. Comparisons of model predictions with the shapes of actual volcanoes reveal the model not to fit lava shield volcanoes, for which the cone represents the solidification of small lava flows, and to provide a poor fit to composite central volcanoes.

  18. The Models of Distance Forms of Learning in National Academy of Statistics, Accounting and Audit

    Directory of Open Access Journals (Sweden)

    L. V.

    2017-03-01

    Full Text Available Finding solutions to the problems faced by the Ukrainian education system require an adequate organizing structure for education system, enabling for transition to the principle of life-long education. The best option for this is the distance learning systems (DLS, which are considered by leading Ukrainian universities as high-performance information technologies in modern education, envisaged by the National Informatization Program, with the goals of reforming higher education in Ukraine in the context of joining the European educational area. The experience of implementing DLS “Prometheus” and Moodle and the main directions of distance learning development at the National Academy of Statistics, Accounting and Audit (NASAA are analyzed and summed up. The emphasis is made on the need to improve the skills of teachers with use of open distance courses and gradual preparation of students for the learning process in the new conditions. The structure of distance courses for different forms of education (full-time, part-time, and blended is built. The forms of learning (face-to-face, the driver complementary, rotation model; flex model, etc. are analyzed. The dynamic version of implementing blended learning models in NASAA using DLS “Prometheus” and Moodle is presented. It is concluded that the experience of NASAA shows that the blended form of distance learning based on Moodle platform is the most adequate to the requirements of Ukraine’s development within the framework of European education.

  19. Privacy by design in personal health monitoring.

    Science.gov (United States)

    Nordgren, Anders

    2015-06-01

    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted.

  20. Kids Sell: Celebrity Kids’ Right to Privacy

    Directory of Open Access Journals (Sweden)

    Seong Choul Hong

    2016-04-01

    Full Text Available The lives of celebrities are often spotlighted in the media because of their newsworthiness; however, many celebrities argue that their right to privacy is often infringed upon. Concerns about celebrity privacy are not limited to the celebrities themselves and often expand to their children. As a result of their popularity, public interest has pushed paparazzi and journalists to pursue trivial and private details about the lives of both celebrities and their children. This paper investigates conflicting areas where the right to privacy and the right to know collide when dealing with the children of celebrities. In general, the courts have been unsympathetic to celebrity privacy claims, noting their newsworthiness and self-promoted characteristic. Unless the press violates news-gathering ethics or torts, the courts will often rule in favor of the media. However, the story becomes quite different when related to an infringement on the privacy of celebrities’ children. This paper argues that all children have a right to protect their privacy regardless of their parents’ social status. Children of celebrities should not be exempt to principles of privacy just because their parents are a celebrity. Furthermore, they should not be exposed by the media without the voluntary consent of their legal patrons. That is, the right of the media to publish and the newsworthiness of children of celebrities must be restrictedly acknowledged.

  1. Morphodynamic Modeling of the Lower Yellow River, China: Flux (Equilibrium) Form or Entrainment (Nonequilibrium) Form of Sediment Mass Conservation?

    Science.gov (United States)

    An, C.; Parker, G.; Ma, H.; Naito, K.; Moodie, A. J.; Fu, X.

    2017-12-01

    Models of river morphodynamics consist of three elements: (1) a treatment of flow hydraulics, (2) a formulation relating some aspect of sediment transport to flow hydraulics, and (3) a description of sediment conservation. In the case of unidirectional river flow, the Exner equation of sediment conservation is commonly described in terms of a flux-based formulation, in which bed elevation variation is related to the streamwise gradient of sediment transport rate. An alternate formulation of the Exner equation, however, is the entrainment-based formulation in which bed elevation variation is related to the difference between the entrainment rate of bed sediment into suspension and the deposition rate of suspended sediment onto the bed. In the flux-based formulation, sediment transport is regarded to be in a local equilibrium state (i.e., sediment transport rate locally equals sediment transport capacity). However, the entrainment-based formulation does not require this constraint; the sediment transport rate may lag in space and time behind the changing flow conditions. In modeling the fine-grained Lower Yellow River, it is usual to treat sediment conservation in terms of an entrainment-based (nonequilibrium) rather than a flux-based (equilibrium) formulation with the consideration that fine-grained sediment may be entrained at one place but deposited only at some distant location downstream. However, the differences in prediction between the two formulations are still not well known, and the entrainment formulation may not always be necessary for the Lower Yellow River. Here we study this problem by comparing the results of flux-based and entrainment-based morphodynamics under conditions typical of the Yellow River, using sediment transport equations specifically designed for the Lower Yellow River. We find, somewhat unexpectedly, that in a treatment of a 200-km reach using uniform sediment, there is little difference between the two formulations unless the

  2. Using genetic information while protecting the privacy of the soul.

    Science.gov (United States)

    Moor, J H

    1999-01-01

    Computing plays an important role in genetics (and vice versa). Theoretically, computing provides a conceptual model for the function and malfunction of our genetic machinery. Practically, contemporary computers and robots equipped with advanced algorithms make the revelation of the complete human genome imminent--computers are about to reveal our genetic souls for the first time. Ethically, computers help protect privacy by restricting access in sophisticated ways to genetic information. But the inexorable fact that computers will increasingly collect, analyze, and disseminate abundant amounts of genetic information made available through the genetic revolution, not to mention that inexpensive computing devices will make genetic information gathering easier, underscores the need for strong and immediate privacy legislation.

  3. The study on privacy preserving data mining for information security

    Science.gov (United States)

    Li, Xiaohui

    2012-04-01

    Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.

  4. Radial Basis Functional Model of Multi-Point Dieless Forming Process for Springback Reduction and Compensation

    Directory of Open Access Journals (Sweden)

    Misganaw Abebe

    2017-11-01

    Full Text Available Springback in multi-point dieless forming (MDF is a common problem because of the small deformation and blank holder free boundary condition. Numerical simulations are widely used in sheet metal forming to predict the springback. However, the computational time in using the numerical tools is time costly to find the optimal process parameters value. This study proposes radial basis function (RBF to replace the numerical simulation model by using statistical analyses that are based on a design of experiment (DOE. Punch holding time, blank thickness, and curvature radius are chosen as effective process parameters for determining the springback. The Latin hypercube DOE method facilitates statistical analyses and the extraction of a prediction model in the experimental process parameter domain. Finite element (FE simulation model is conducted in the ABAQUS commercial software to generate the springback responses of the training and testing samples. The genetic algorithm is applied to find the optimal value for reducing and compensating the induced springback for the different blank thicknesses using the developed RBF prediction model. Finally, the RBF numerical result is verified by comparing with the FE simulation result of the optimal process parameters and both results show that the springback is almost negligible from the target shape.

  5. 5G Visions of User Privacy

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    2015-01-01

    Currently, the discussions are going on the elements and definition of 5G networks. One of the elements in this discussion is how to provide for user controlled privacy for securing users' digital interaction. The purpose of this paper is to present elements of user controlled privacy needed...... for the future 5G networks. The paper concludes that an ecosystem consisting of Trusted Third Party between the end user and the service providers as a distributed system could be integrated to secure the perspective of user controlled privacy for future systems...

  6. Form Follows Function: A Model for Clinical Supervision of Genetic Counseling Students.

    Science.gov (United States)

    Wherley, Colleen; Veach, Patricia McCarthy; Martyr, Meredith A; LeRoy, Bonnie S

    2015-10-01

    Supervision plays a vital role in genetic counselor training, yet models describing genetic counseling supervision processes and outcomes are lacking. This paper describes a proposed supervision model intended to provide a framework to promote comprehensive and consistent clinical supervision training for genetic counseling students. Based on the principle "form follows function," the model reflects and reinforces McCarthy Veach et al.'s empirically derived model of genetic counseling practice - the "Reciprocal Engagement Model" (REM). The REM consists of mutually interactive educational, relational, and psychosocial components. The Reciprocal Engagement Model of Supervision (REM-S) has similar components and corresponding tenets, goals, and outcomes. The 5 REM-S tenets are: Learning and applying genetic information are key; Relationship is integral to genetic counseling supervision; Student autonomy must be supported; Students are capable; and Student emotions matter. The REM-S outcomes are: Student understands and applies information to independently provide effective services, develop professionally, and engage in self-reflective practice. The 16 REM-S goals are informed by the REM of genetic counseling practice and supported by prior literature. A review of models in medicine and psychology confirms the REM-S contains supervision elements common in healthcare fields, while remaining unique to genetic counseling. The REM-S shows promise for enhancing genetic counselor supervision training and practice and for promoting research on clinical supervision. The REM-S is presented in detail along with specific examples and training and research suggestions.

  7. Enforcement of Privacy Policies over Multiple Online Social Networks for Collaborative Activities

    Science.gov (United States)

    Wu, Zhengping; Wang, Lifeng

    Our goal is to tend to develop an enforcement architecture of privacy policies over multiple online social networks. It is used to solve the problem of privacy protection when several social networks build permanent or temporary collaboration. Theoretically, this idea is practical, especially due to more and more social network tend to support open source framework “OpenSocial”. But as we known different social network websites may have the same privacy policy settings based on different enforcement mechanisms, this would cause problems. In this case, we have to manually write code for both sides to make the privacy policy settings enforceable. We can imagine that, this is a huge workload based on the huge number of current social networks. So we focus on proposing a middleware which is used to automatically generate privacy protection component for permanent integration or temporary interaction of social networks. This middleware provide functions, such as collecting of privacy policy of each participant in the new collaboration, generating a standard policy model for each participant and mapping all those standard policy to different enforcement mechanisms of those participants.

  8. FLOW STRESS MODEL FOR COLD-FORMED 40HM CONSTRUCTIONAL STEEL

    Directory of Open Access Journals (Sweden)

    Anna Dziubińska

    2014-03-01

    Full Text Available The paper presents the results of research undertaken to investigate cold forming process for 40HM constructional steel suitable for heat treatment. In the first part of the paper, mechanical properties of this steel and its industrial applications are described. The second part of the paper presents the results of the analysis of flow curves for two kinds of steel specimens: those that were subjected to annealing and those that did not undergo any heat treatment. It was found that the application of heat treatment had a significant effect on improving the forming conditions for this steel at room temperature. The experimental flow curves obtained in a compression test were described by constitutive equations illustrating the dependence between flow stresses and strain value. In order to determine the equation coefficients, the Generalized Reduced Gradient method implemented in Microsoft Excel was used. Based on the obtained equations, a material model will be developed to perform numerical simulations of cold forming for 40HM steel, using FEM-based software that aids the design of metal forming technologies.

  9. Numerical modelling evaluation for the microclimate of an outdoor urban form in Cairo, Egypt

    Directory of Open Access Journals (Sweden)

    Mohamed H. Elnabawi

    2015-08-01

    Full Text Available In order to achieve outdoor thermal comfort it is necessary to understand the interactions between the prevailing climate, the urban form and roughness. The near surface boundary layer is directly influenced by local irradiative and convective exchange processes due to the presence of a variety of different surfaces, sheltering elements and obstacles to air flow leading to distinctive micro-scale climates. The paper presents a micro-scale numerical model for an outdoor urban form for a hot summer’s day in Al-Muizz street located at the Islamic quarter of Cairo, where a few studies have attempted to study these conditions in vernacular settings in hot arid areas where the continuously evolving urban patterns and shaded environments were perceived to produce more pedestrian friendly outdoor environments. In situ measurements are used to validate the ENVI-met results which showed an overall agreement with the observed ones, representing adequate mean radiant temperature (Tmrt which is one of the most important meteorological parameters governing human energy balance and has therefore a strong influence on thermal sensation of the pedestrians using the open public spaces and generating a micro-climatic map as an initial step in addressing the urgent need for a modelling platform accessible to urban designers, architects, and decision makers towards sustainable urban forms.

  10. Model Identification and FE Simulations: Effect of Different Yield Loci and Hardening Laws in Sheet Forming

    International Nuclear Information System (INIS)

    Flores, P.; Lelotte, T.; Bouffioux, C.; El Houdaigui, F.; Habraken, A.M.; Duchene, L.; Bael, A. van; He, S.; Duflou, J.

    2005-01-01

    The bi-axial experimental equipment developed by Flores enables to perform Baushinger shear tests and successive or simultaneous simple shear tests and plane-strain tests. Such experiments and classical tensile tests investigate the material behavior in order to identify the yield locus and the hardening models. With tests performed on two steel grades, the methods applied to identify classical yield surfaces such as Hill or Hosford ones as well as isotropic Swift type hardening or kinematic Armstrong-Frederick hardening models are explained. Comparison with the Taylor-Bishop-Hill yield locus is also provided. The effect of both yield locus and hardening model choice will be presented for two applications: Single Point Incremental Forming (SPIF) and a cup deep drawing

  11. Model Identification and FE Simulations: Effect of Different Yield Loci and Hardening Laws in Sheet Forming

    Science.gov (United States)

    Flores, P.; Duchêne, L.; Lelotte, T.; Bouffioux, C.; El Houdaigui, F.; Van Bael, A.; He, S.; Duflou, J.; Habraken, A. M.

    2005-08-01

    The bi-axial experimental equipment developed by Flores enables to perform Baushinger shear tests and successive or simultaneous simple shear tests and plane-strain tests. Such experiments and classical tensile tests investigate the material behavior in order to identify the yield locus and the hardening models. With tests performed on two steel grades, the methods applied to identify classical yield surfaces such as Hill or Hosford ones as well as isotropic Swift type hardening or kinematic Armstrong-Frederick hardening models are explained. Comparison with the Taylor-Bishop-Hill yield locus is also provided. The effect of both yield locus and hardening model choice will be presented for two applications: Single Point Incremental Forming (SPIF) and a cup deep drawing.

  12. On unique parameters and unified formal form of hot-wire anemometric sensor model

    International Nuclear Information System (INIS)

    LigePza, P.

    2005-01-01

    This note reviews the extensively adopted equations used as models of hot-wire anemometric sensors. An unified formal form of the mathematical model of a hot-wire anemometric sensor with otherwise defined parameters is proposed. Those parameters, static and dynamic, have simple physical interpretation and can be easily determined. They show directly the range of sensor application. They determine the metrological properties of the given sensor in the actual medium. Hence, the parameters' values might be ascribed to each sensor in the given medium and be quoted in manufacturers' catalogues, supplementing the sensor specifications. Because of their simple physical interpretation, those parameters allow the direct comparison of the fundamental metrological properties of various sensors and selection of the optimal sensor for the given research measurement application. The parameters are also useful in modeling complex hot-wire systems

  13. PHOTOIONIZATION MODELS FOR THE SEMI-FORBIDDEN C iii] 1909 EMISSION IN STAR-FORMING GALAXIES

    Energy Technology Data Exchange (ETDEWEB)

    Jaskot, A. E. [Department of Astronomy, Smith College, Northampton, MA 01063 (United States); Ravindranath, S. [Space Telescope Science Institute, Baltimore, MD 21218 (United States)

    2016-12-20

    The increasing neutrality of the intergalactic medium at z  > 6 suppresses Ly α emission, and spectroscopic confirmation of galaxy redshifts requires the detection of alternative ultraviolet lines. The strong [C iii]  λ 1907+C iii]  λ 1909 doublet frequently observed in low-metallicity, actively star-forming galaxies is a promising emission feature. We present CLOUDY photoionization model predictions for C iii] equivalent widths (EWs) and line ratios as a function of starburst age, metallicity, and ionization parameter. Our models include a range of C/O abundances, dust content, and gas density. We also examine the effects of varying the nebular geometry and optical depth. Only the stellar models that incorporate binary interaction effects reproduce the highest observed C iii] EWs. The spectral energy distributions from the binary stellar population models also generate observable C iii] over a longer timescale relative to single-star models. We show that diagnostics using C iii] and nebular He ii  λ 1640 can separate star-forming regions from shock-ionized gas. We also find that density-bounded systems should exhibit weaker C iii] EWs at a given ionization parameter, and C iii] EWs could, therefore, select candidate Lyman continuum-leaking systems. In almost all models, C iii] is the next strongest line at <2700 Å after Ly α , and C iii] reaches detectable levels for a wide range of conditions at low metallicity. C iii] may therefore serve as an important diagnostic for characterizing galaxies at z  > 6.

  14. PHOTOIONIZATION MODELS FOR THE SEMI-FORBIDDEN C iii] 1909 EMISSION IN STAR-FORMING GALAXIES

    International Nuclear Information System (INIS)

    Jaskot, A. E.; Ravindranath, S.

    2016-01-01

    The increasing neutrality of the intergalactic medium at z  > 6 suppresses Ly α emission, and spectroscopic confirmation of galaxy redshifts requires the detection of alternative ultraviolet lines. The strong [C iii]  λ 1907+C iii]  λ 1909 doublet frequently observed in low-metallicity, actively star-forming galaxies is a promising emission feature. We present CLOUDY photoionization model predictions for C iii] equivalent widths (EWs) and line ratios as a function of starburst age, metallicity, and ionization parameter. Our models include a range of C/O abundances, dust content, and gas density. We also examine the effects of varying the nebular geometry and optical depth. Only the stellar models that incorporate binary interaction effects reproduce the highest observed C iii] EWs. The spectral energy distributions from the binary stellar population models also generate observable C iii] over a longer timescale relative to single-star models. We show that diagnostics using C iii] and nebular He ii  λ 1640 can separate star-forming regions from shock-ionized gas. We also find that density-bounded systems should exhibit weaker C iii] EWs at a given ionization parameter, and C iii] EWs could, therefore, select candidate Lyman continuum-leaking systems. In almost all models, C iii] is the next strongest line at <2700 Å after Ly α , and C iii] reaches detectable levels for a wide range of conditions at low metallicity. C iii] may therefore serve as an important diagnostic for characterizing galaxies at z  > 6.

  15. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II.

    Science.gov (United States)

    Watzlaf, Valerie J M; Moeini, Sohrab; Matusow, Laura; Firouzan, Patti

    2011-01-01

    In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR.

  16. Urban Form Energy Use and Emissions in China: Preliminary Findings and Model Proof of Concept

    Energy Technology Data Exchange (ETDEWEB)

    Aden, Nathaniel; Qin, Yining; Fridley, David

    2010-12-15

    Urbanization is reshaping China's economy, society, and energy system. Between 1990 and 2008 China added more than 300 million new urban residents, bringing the total urbanization rate to 46%. The ongoing population shift is spurring energy demand for new construction, as well as additional residential use with the replacement of rural biomass by urban commercial energy services. This project developed a modeling tool to quantify the full energy consequences of a particular form of urban residential development in order to identify energy- and carbon-efficient modes of neighborhood-level development and help mitigate resource and environmental implications of swelling cities. LBNL developed an integrated modeling tool that combines process-based lifecycle assessment with agent-based building operational energy use, personal transport, and consumption modeling. The lifecycle assessment approach was used to quantify energy and carbon emissions embodied in building materials production, construction, maintenance, and demolition. To provide more comprehensive analysis, LBNL developed an agent-based model as described below. The model was applied to LuJing, a residential development in Jinan, Shandong Province, to provide a case study and model proof of concept. This study produced results data that are unique by virtue of their scale, scope and type. Whereas most existing literature focuses on building-, city-, or national-level analysis, this study covers multi-building neighborhood-scale development. Likewise, while most existing studies focus exclusively on building operational energy use, this study also includes embodied energy related to personal consumption and buildings. Within the boundaries of this analysis, food is the single largest category of the building energy footprint, accounting for 23% of the total. On a policy level, the LCA approach can be useful for quantifying the energy and environmental benefits of longer average building lifespans. In

  17. Chewing as a forming application: A viscoplastic damage law in modelling food oral breakdown

    Science.gov (United States)

    Skamniotis, C. G.; Charalambides, M. N.; Elliott, M.

    2017-10-01

    The first bite mechanical response of a food item resembles compressive forming processes, where a tool is pressed into a workpiece. The present study addresses ongoing interests in the deformations and damage of food products, particularly during the first bite, in relation to their mechanical properties. Uniaxial tension, compression and shear tests on a starch based food reveal stress-strain response and fracture strains strongly dependent on strain rate and stress triaxiality, while damage mechanisms are identified in the form of stress softening. A pressure dependent viscoplastic constitutive law reproduces the behavior with the aid of ABAQUS subroutines, while a ductile damage initiation and evolution framework based on fracture toughness data enables accurate predictions of the product breakdown. The material model is implemented in a Finite Element (FE) chewing model based on digital pet teeth geometry where the first bite of molar teeth against a food item is simulated. The FE force displacement results match the experimental data obtained by a physical replicate of the bite model, lending weight to the approach as a powerful tool in understanding of food breakdown and product development.

  18. Modeling of the flow behavior of SAE 8620H combing microstructure evolution in hot forming

    Science.gov (United States)

    Fu, Xiaobin; Wang, Baoyu; Tang, Xuefeng

    2017-10-01

    With the development of net-shape forming technology, hot forming process is widely applied to manufacturing gear parts, during which, materials suffer severe plastic distortion and microstructure changes continually. In this paper, to understand and model the flow behavior and microstructure evolution, SAE 8620H, a widely used gear steel, is selected as the object and the flow behavior and microstructure evolution are observed by an isothermal hot compression tests at 1273-1373 K with a strain rate of 0.1-10 s-1. Depending on the results of the compression test, a set of internal-state-variable based unified constitutive equations is put forward to describe the flow behavior and microstructure evaluation of SAE 8620H. Moreover, the evaluation of the dislocation density and the fraction of dynamic recrystallization based on the theory of thermal activation is modeled and reincorporated into the constitutive law. The material parameters in the constitutive model are calculated based on the measured flow stress and dynamic recrystallization fraction. The predicted flow stress under different deformation conditions has a good agreement with the measured results.

  19. Social Media Text Classification by Enhancing Well-Formed Text Trained Model

    Directory of Open Access Journals (Sweden)

    Phat Jotikabukkana

    2016-09-01

    Full Text Available Social media are a powerful communication tool in our era of digital information. The large amount of user-generated data is a useful novel source of data, even though it is not easy to extract the treasures from this vast and noisy trove. Since classification is an important part of text mining, many techniques have been proposed to classify this kind of information. We developed an effective technique of social media text classification by semi-supervised learning utilizing an online news source consisting of well-formed text. The computer first automatically extracts news categories, well-categorized by publishers, as classes for topic classification. A bag of words taken from news articles provides the initial keywords related to their category in the form of word vectors. The principal task is to retrieve a set of new productive keywords. Term Frequency-Inverse Document Frequency weighting (TF-IDF and Word Article Matrix (WAM are used as main methods. A modification of WAM is recomputed until it becomes the most effective model for social media text classification. The key success factor was enhancing our model with effective keywords from social media. A promising result of 99.50% accuracy was achieved, with more than 98.5% of Precision, Recall, and F-measure after updating the model three times.

  20. Negotiating privacy in surveillant welfare relations

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Lauritsen, Peter; Bøge, Ask Risom

    The Danish welfare system is dependent on surveillance practices. Health authorities screen for diseases, tax authorities surveil financial flows, and social services are surveillant to vulnerable families. Such state surveillance is often related to, and opposed to, the privacy of citizens....... However, while privacy is central to debates of surveillance, it has proven less productive as an analytical resource for studying surveillance in practice. Consequently, this paper reviews different conceptualisations of privacy in relation to welfare and surveillance and argues for strengthening...... the analytical capacity of the concept by rendering it a situated and relational concept. The argument is developed through a research and design project called Teledialogue meant to improve the relation between case managers and children placed at institutions or in foster families. Privacy in Teledialogue...

  1. Millennials sex differences on Snapchat perceived privacy

    Directory of Open Access Journals (Sweden)

    Antonietta Rauzzino

    2017-07-01

    Full Text Available Snapchat offers a distinctive feature from other social networks in that its users control the visibility of the contents they share with others by defining how long these contents may be available. Snapchat is changing the way men and women perceive online information privacy and content management. This paper aims to illustrate the relevance of social representation theory to evaluate perceived privacy in Snapchat users, with a sample of 268 young adults residing in Bogotá. A survey method was employed for data collection purposes. The results reveal that Snapchat users are concerned about their networks’ privacy, with no significant sex differences, although men's perception of Snapchat privacy is safer than that of women. Finally, a discussion is presented as to the limitations and implications of these results for further studies.

  2. Privacy amplification for quantum key distribution

    International Nuclear Information System (INIS)

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  3. An overview of human genetic privacy.

    Science.gov (United States)

    Shi, Xinghua; Wu, Xintao

    2017-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed, not only for individuals but also for their families. In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data. We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions. © 2016 New York Academy of Sciences.

  4. 77 FR 15585 - Privacy Act; Implementation

    Science.gov (United States)

    2012-03-16

    ... way the economy; a sector of the economy; productivity; competition; jobs; the environment; public... amended to read as follows: PART 311--OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM 0...

  5. 76 FR 56 - Privacy Act; Implementation

    Science.gov (United States)

    2011-01-03

    ...; productivity; competition; jobs; the environment; public health or safety; or State, local, or Tribal... amended to read as follows: PART 311--OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM 1...

  6. Overexpression of periostin and distinct mesothelin forms predict malignant progression in a rat cholangiocarcinoma model.

    Science.gov (United States)

    Manzanares, Miguel Á; Campbell, Deanna J W; Maldonado, Gabrielle T; Sirica, Alphonse E

    2018-02-01

    Periostin and mesothelin have each been suggested to be predictors of poor survival for patients with intrahepatic cholangiocarcinoma, although the clinical prognostic value of both of these biomarkers remains uncertain. The aim of the current study was to investigate these biomarkers for their potential to act as tumor progression factors when assessed in orthotopic tumor and three-dimensional culture models of rat cholangiocarcinoma progression. Using our orthotopic model, we demonstrated a strong positive correlation between tumor and serum periostin and mesothelin and increasing liver tumor mass and associated peritoneal metastases that also reflected differences in cholangiocarcinoma cell aggressiveness and malignant grade. Periostin immunostaining was most prominent in the desmoplastic stroma of larger sized more aggressive liver tumors and peritoneal metastases. In comparison, mesothelin was more highly expressed in the cholangiocarcinoma cells; the slower growing more highly differentiated liver tumors exhibited a luminal cancer cell surface immunostaining for this biomarker, and the rapidly growing less differentiated liver and metastatic tumor masses largely showed cytoplasmic mesothelin immunoreactivity. Two molecular weight forms of mesothelin were identified, one at ∼40 kDa and the other, a more heavily glycosylated form, at ∼50 kDa. Increased expression of the 40-kDa mesothelin over that of the 50 kDa form predicted increased malignant progression in both the orthotopic liver tumors and in cholangiocarcinoma cells of different malignant potential in three-dimensional culture. Moreover, coculturing of cancer-associated myofibroblasts with cholangiocarcinoma cells promoted overexpression of the 40-kDa mesothelin, which correlated with enhanced malignant progression in vitro . Conclusion : Periostin and mesothelin are useful predictors of tumor progression in our rat desmoplastic cholangiocarcinoma models. This supports their relevance to human

  7. Vehicular Internet: Security & Privacy Challenges and Opportunities

    Directory of Open Access Journals (Sweden)

    Kamran Zaidi

    2015-07-01

    Full Text Available The vehicular internet will drive the future of vehicular technology and intelligent transportation systems (ITS. Whether it is road safety, infotainment, or driver-less cars, the vehicular internet will lay the foundation for the future of road travel. Governments and companies are pursuing driver-less vehicles as they are considered to be more reliable than humans and, therefore, safer. The vehicles today are not just a means of transportation but are also equipped with a wide range of sensors that provide valuable data. If vehicles are enabled to share data that they collect with other vehicles or authorities for decision-making and safer driving, they thereby form a vehicular network. However, there is a lot at stake in vehicular networks if they are compromised. With the stakes so high, it is imperative that the vehicular networks are secured and made resilient to any attack or attempt that may have serious consequences. The vehicular internet can also be the target of a cyber attack, which can be devastating. In this paper, the opportunities that the vehicular internet offers are presented and then various security and privacy aspects are discussed and some solutions are presented.

  8. A mathematical model for the determination of forming tissue moduli in needled-nonwoven scaffolds.

    Science.gov (United States)

    Soares, João S; Zhang, Will; Sacks, Michael S

    2017-03-15

    Formation of engineering tissues (ET) remains an important scientific area of investigation for both clinical translational and mechanobiological studies. Needled-nonwoven (NNW) scaffolds represent one of the most ubiquitous biomaterials based on their well-documented capacity to sustain tissue formation and the unique property of substantial construct stiffness amplification, the latter allowing for very sensitive determination of forming tissue modulus. Yet, their use in more fundamental studies is hampered by the lack of: (1) substantial understanding of the mechanics of the NNW scaffold itself under finite deformations and means to model the complex mechanical interactions between scaffold fibers, cells, and de novo tissue; and (2) rational models with reliable predictive capabilities describing their evolving mechanical properties and their response to mechanical stimulation. Our objective is to quantify the mechanical properties of the forming ET phase in constructs that utilize NNW scaffolds. We present herein a novel mathematical model to quantify their stiffness based on explicit considerations of the modulation of NNW scaffold fiber-fiber interactions and effective fiber stiffness by surrounding de novo ECM. Specifically, fibers in NNW scaffolds are effectively stiffer than if acting alone due to extensive fiber-fiber cross-over points that impart changes in fiber geometry, particularly crimp wavelength and amplitude. Fiber-fiber interactions in NNW scaffolds also play significant role in the bulk anisotropy of the material, mainly due to fiber buckling and large translational out-of-plane displacements occurring to fibers undergoing contraction. To calibrate the model parameters, we mechanically tested impregnated NNW scaffolds with polyacrylamide (PAM) gels with a wide range of moduli with values chosen to mimic the effects of surrounding tissues on the scaffold fiber network. Results indicated a high degree of model fidelity over a wide range of planar

  9. Privacy and legal issues in cloud computing

    CERN Document Server

    Weber, Rolf H

    2015-01-01

    Adopting a multi-disciplinary and comparative approach, this book focuses on emerging and innovative attempts to tackle privacy and legal issues in cloud computing, such as personal data privacy, security and intellectual property protection. Leading international academics and practitioners in the fields of law and computer science examine the specific legal implications of cloud computing pertaining to jurisdiction, biomedical practice and information ownership. This collection offers original and critical responses to the rising challenges posed by cloud computing.

  10. Privacy: The Small and Large of It

    Energy Technology Data Exchange (ETDEWEB)

    NUSBAUM,ANNA W.

    1999-10-22

    The topic of Privacy is complex, multi-faceted, and often emotionally laden. This paper will cover the following topics, in an effort to further understanding of federal regulations and activities, the balancing act that necessarily occurs in business, and what role a records manager can play. The topics are: Definitions; The Privacy Act; ''Private'' companies; Potential areas of concern; Expectations; Corporate responsibilities; Case studies; and Records Manager's role.

  11. Privacy: The Small and Large of It

    International Nuclear Information System (INIS)

    NUSBAUM, ANNA W.

    1999-01-01

    The topic of Privacy is complex, multi-faceted, and often emotionally laden. This paper will cover the following topics, in an effort to further understanding of federal regulations and activities, the balancing act that necessarily occurs in business, and what role a records manager can play. The topics are: Definitions; The Privacy Act; ''Private'' companies; Potential areas of concern; Expectations; Corporate responsibilities; Case studies; and Records Manager's role

  12. Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

    Directory of Open Access Journals (Sweden)

    Yujia Liu

    2017-01-01

    Full Text Available Online image sharing in social platforms can lead to undesired privacy disclosure. For example, some enterprises may detect these large volumes of uploaded images to do users’ in-depth preference analysis for commercial purposes. And their technology might be today’s most powerful learning model, deep neural network (DNN. To just elude these automatic DNN detectors without affecting visual quality of human eyes, we design and implement a novel Stealth algorithm, which makes the automatic detector blind to the existence of objects in an image, by crafting a kind of adversarial examples. It is just like all objects disappear after wearing an “invisible cloak” from the view of the detector. Then we evaluate the effectiveness of Stealth algorithm through our newly defined measurement, named privacy insurance. The results indicate that our scheme has considerable success rate to guarantee privacy compared with other methods, such as mosaic, blur, and noise. Better still, Stealth algorithm has the smallest impact on image visual quality. Meanwhile, we set a user adjustable parameter called cloak thickness for regulating the perturbation intensity. Furthermore, we find that the processed images have transferability property; that is, the adversarial images generated for one particular DNN will influence the others as well.

  13. Cyber security challenges in Smart Cities: Safety, security and privacy.

    Science.gov (United States)

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  14. Cyber security challenges in Smart Cities: Safety, security and privacy

    Directory of Open Access Journals (Sweden)

    Adel S. Elmaghraby

    2014-07-01

    Full Text Available The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  15. Users or Students? Privacy in University MOOCS.

    Science.gov (United States)

    Jones, Meg Leta; Regner, Lucas

    2016-10-01

    Two terms, student privacy and Massive Open Online Courses, have received a significant amount of attention recently. Both represent interesting sites of change in entrenched structures, one educational and one legal. MOOCs represent something college courses have never been able to provide: universal access. Universities not wanting to miss the MOOC wave have started to build MOOC courses and integrate them into the university system in various ways. However, the design and scale of university MOOCs create tension for privacy laws intended to regulate information practices exercised by educational institutions. Are MOOCs part of the educational institutions these laws and policies aim to regulate? Are MOOC users students whose data are protected by aforementioned laws and policies? Many university researchers and faculty members are asked to participate as designers and instructors in MOOCs but may not know how to approach the issues proposed. While recent scholarship has addressed the disruptive nature of MOOCs, student privacy generally, and data privacy in the K-12 system, we provide an in-depth description and analysis of the MOOC phenomenon and the privacy laws and policies that guide and regulate educational institutions today. We offer privacy case studies of three major MOOC providers active in the market today to reveal inconsistencies among MOOC platform and the level and type of legal uncertainty surrounding them. Finally, we provide a list of organizational questions to pose internally to navigate the uncertainty presented to university MOOC teams.

  16. Form-finding of complex tensegrity structures: application to cell cytoskeleton modelling

    Science.gov (United States)

    Baudriller, Haïmad; Maurin, Bernard; Cañadas, Patrick; Montcourrier, Philippe; Parmeggiani, Andrea; Bettache, Nadir

    2006-11-01

    The ability to model the mechanical behaviour of the cell cytoskeleton as realistically as possible is a key point in understanding numerous biological mechanisms. Tensegrity systems have already demonstrated their pertinence for this purpose. However, the structures considered until now are based only on models with simplified geometry and topology compared to the true complexity of cytoskeleton architecture. The aim of this Note is to propose a form-finding method for generating nonregular tensegrity shapes of higher diversity and complexity. The process relies on the use of the dynamic relaxation method. Further improvements have made it possible to control the computed morphologies and to modify them to approach experimentally observed configurations. Various examples illustrate the use of the method and the results obtained for different cell typologies. To cite this article: H. Baudriller et al., C. R. Mecanique 334 (2006).

  17. A Fully-Coupled Approach for Modelling Plastic Deformation and Liquid Lubrication in Metal Forming

    DEFF Research Database (Denmark)

    Üstünyagiz, Esmeray; Christiansen, Peter; Nielsen, Chris Valentin

    2016-01-01

    flow formulation which stands on the border line between fluidand solid mechanics and allows treating the lubricants as viscous incompressible (or nearlyincompressible) fluid and the metallic materials as non-Newtonian, high viscous, incompressiblefluids. The presentation is focused on the theoretical......This paper presents a new approach for combined modelling of plastic deformation andliquid lubrication in the contact interfaces between material and tooling in metal forming includingsituations where the lubricant is functioning as a pressure carrier. The approach is an alternative toconventional...... elements with fictitious small stiffness to physical modelling based on a fullycoupled procedure in which the lubricant flow and the plastic deformation of the metallic materialare solved simultaneously. The approach takes advantage of the intrinsic velocity-pressurecharacteristics of the finite element...

  18. New models for energy beam machining enable accurate generation of free forms.

    Science.gov (United States)

    Axinte, Dragos; Billingham, John; Bilbao Guillerna, Aitor

    2017-09-01

    We demonstrate that, despite differences in their nature, many energy beam controlled-depth machining processes (for example, waterjet, pulsed laser, focused ion beam) can be modeled using the same mathematical framework-a partial differential evolution equation that requires only simple calibrations to capture the physics of each process. The inverse problem can be solved efficiently through the numerical solution of the adjoint problem and leads to beam paths that generate prescribed three-dimensional features with minimal error. The viability of this modeling approach has been demonstrated by generating accurate free-form surfaces using three processes that operate at very different length scales and with different physical principles for material removal: waterjet, pulsed laser, and focused ion beam machining. Our approach can be used to accurately machine materials that are hard to process by other means for scalable applications in a wide variety of industries.

  19. Unified constitutive modelling for two-phase lamellar titanium alloys at hot forming conditions

    Directory of Open Access Journals (Sweden)

    Yang Lei

    2016-01-01

    Full Text Available In this paper, a set of mechanism based unified viscoplastic constitutive equations have been established for two-phase titanium alloys with initial lamellar microstructure, which models the softening mechanisms of the alloys in hot forming conditions. The dislocation density, rotation and globularization of lamellar α-phase and their effects on flow behaviour can also be modelled. The values of material constants in the equation set have been calibrated, according to stress-strain curves and globularization fractions of lamellar α-phase obtained from compression tests at a range of temperatures and strain rates, using a genetic algorithm (GA based optimisation method. Based on the determined constitutive equations, flow stress and globularization evolution of Ti-17 and TA15 alloys at different temperatures and strain rates were predicted. Good agreements between the experimental and computed results were obtained.

  20. Surface Deformation and Direct Field Observation to Constrain Conceptual Models of Hydraulic Fracture Growth and Form

    Science.gov (United States)

    Slack, W.; Murdoch, L.

    2016-12-01

    Hydraulic fractures can be created in shallow soil or bedrock to promote processes that destroy or remove chemical contaminants. The form of the fracture plays an important role in how it is used in such applications. We created more than 4500 environmental hydraulic fractures at approximately 300 sites since 1990, and we measured surface deformation at many. Several of these sites subsequently were excavated to evaluate fracture form in detail. In one recent example, six hydraulic fractures were created at 1.5m depth while we measured upward displacement and tilt at 15 overlying locations. We excavated in the vicinities of two of the fractures and mapped the exposed fractures. Tilt vectors were initially symmetric about the borehole but radiated from a point that moved southwest with time. Upward displacement of as much as 2.5 cm covered a region 5m to 6m across. The maximum displacement was roughly at the center of the deformed region but was 2m southwest of the borehole, consistent with the tilt data. Excavation revealed an oblong, proppant-filled fracture over 4.2 m in length with a maximum thickness of 1 cm, so the proppant covers a region that is smaller than the uplifted area and the proppant thickness is roughly half of the uplift. The fracture was shaped like a shallow saucer with maximum dips of approximately 15o at the southwestern end. The pattern of tilt and uplift generally reflect the aperture of the underlying pressurized fracture, but the deformation extends beyond the extent of the sand proppant so a quantitative interpretation requires inversion. Inversion of the tilt data using a simple double dislocation model under-estimates the extent but correctly predicts the depth, orientation, and off-centered location. Inversion of uplift using a model that assumes the overburden deforms like a plate over-estimates the extent. Neither can characterize the curved shape. A forward model using FEM analysis capable of representing 3D shapes is capable of

  1. Implementation of a pressure and rate dependent Forming Limit Diagram model into NIKE and DYNA

    Energy Technology Data Exchange (ETDEWEB)

    Logan, R.W. [Lawrence Livermore National Lab., CA (United States); Thomas, D.B.; Young, G.K. [Boeing Commercial Airplane Group, Seattle, WA (United States)

    1995-06-01

    The Forming Limit Diagram (FLD) has been used for decades as an aid to successful sheet metal forming. In this work, we describe the incorporation of the FLD technique into the DYNA and NIKE codes at LLNL along with applications that led to the developments. The algorithm is currently available in the public version of DYNA3D. Several augmentations of the basic technique have been made available due to the necessity of their incorporation to solve programmatic problems of interest at LLNL. Illustration of the use of the FLD model is shown for a dome geometry similar to that used in the Limiting Dome Height (LDH) test. This early example uses the simplest FLD option (analogous to circle grid) and shows the relative merits of this method versus scalar plastic work in prediction of tearing. In a phenomenological extension of the method, a pressure-dependent (FLD+P) method is used to successfully predict the relative design merits of stainless steel forgings. A final application to sheet stamping of a Boeing 757 door frame shows how the scatter plot circle grid option and strain path plots can be used to predict when preforms and intermediate anneals are necessary. The phenomenological nature of the FLD model as implemented is discussed relative to alternative approaches of calculating the FLD and its path dependence.

  2. Laboratory Modeling of Self-Formed Leveed Channels From Sediment-Laden Flows Entering Still Water

    Science.gov (United States)

    Rowland, J. C.; Dietrich, W. E.

    2004-12-01

    Self-formed leveed channels constructed by deposition of suspended sediment from sediment-laden flows entering still water are common features in nature. Such channels drive delta progradation, develop at tidal inlets and occur where mainstem river flows empty into oxbows and blocked valley lakes. Presently there is no theory for the formation of such channels. This lack of theory is partly due to a lack of field or laboratory studies that provide insight about the mechanism controlling these self-formed, propagating channels. The creation of such features in the laboratory, have proved illusive to date. Our ongoing experiments aimed at modeling the formation of floodplain tie channels provide insight into the necessary conditions for levee formation and channel growth. Under conditions of steady water discharge, constant sediment feed rate, unimodal sediment distribution and invariant basin stage we are able to create subaqueous lateral bars (submerged levees) along the margins of a sediment laden jet. Our results highlight the sensitivity of channel formation to issues of scaling and experimental design. In the laboratory, levee formation has only been possible with the use of plastic particles (specific gravity ~1.5); complete bed alluviation and dune formation results from the use of particles with specific gravities of ~ 2.65 across a range grain diameters and shapes. We hypothesize this effect is related to high entrainment thresholds relative to suspension thresholds of small (< 100 mm) natural particles under conditions of reduced turbulence in laboratory scaled flows. Additionally, both the width to depth ratio and the form of the outlet channel introducing the sediment laden flow into the experimental basin exert a strong control on sedimentation pattern and levee growth. Continuing experiments are focused on generating emergent channel levees and a basin ward propagation of the channel by adjusting the form of the feed channel, varying basin stage, and

  3. An engineering, multiscale constitutive model for fiber-forming collagen in tension.

    Science.gov (United States)

    Annovazzi, Lorella; Genna, Francesco

    2010-01-01

    This work proposes a nonlinear constitutive model for a single collagen fiber. Fiber-forming collagen can exhibit different hierarchies of basic units, called fascicles, bundles, fibrils, microfibrils, and so forth, down to the molecular (tropocollagen) level. Exploiting the fact that at each hierarchy level the microstructure can be seen, at least approximately, as that of a wavy, or crimped, extensible cable, the proposed stress-strain model considers a given number of levels, each of which contributes to the overall mechanical behavior according to its own geometrical features (crimp, or waviness), as well as to the basic mechanical properties of the tropocollagen. The crimp features at all levels are assumed to be random variables, whose statistical integration furnishes a stress-strain curve for a collagen fiber. The soundness of this model-the first, to the Authors' knowledge, to treat a single collagen fiber as a microstructured nonlinear structural element-is checked by its application to collagen fibers for which experimental results are available: rat tail tendon, periodontal ligament, and engineered ones. Here, no attempt is made to obtain a stress-strain law for generic collagenous tissues, which exhibit specific features, often much more complex than those of a single fiber. However, it is trivial to observe that the availability of a sound, microstructurally based constitutive law for a single collagen fiber (but applicable at any sub-level, or to any other material with a similar microstructure) is essential for assembling complex constitutive models for any collagenous fibrous tissue.

  4. A reduced-form intensity-based model under fuzzy environments

    Science.gov (United States)

    Wu, Liang; Zhuang, Yaming

    2015-05-01

    The external shocks and internal contagion are the important sources of default events. However, the external shocks and internal contagion effect on the company is not observed, we cannot get the accurate size of the shocks. The information of investors relative to the default process exhibits a certain fuzziness. Therefore, using randomness and fuzziness to study such problems as derivative pricing or default probability has practical needs. But the idea of fuzzifying credit risk models is little exploited, especially in a reduced-form model. This paper proposes a new default intensity model with fuzziness and presents a fuzzy default probability and default loss rate, and puts them into default debt and credit derivative pricing. Finally, the simulation analysis verifies the rationality of the model. Using fuzzy numbers and random analysis one can consider more uncertain sources in the default process of default and investors' subjective judgment on the financial markets in a variety of fuzzy reliability so as to broaden the scope of possible credit spreads.

  5. A Closed-Form Error Model of Straight Lines for Improved Data Association and Sensor Fusing

    Directory of Open Access Journals (Sweden)

    Volker Sommer

    2018-04-01

    Full Text Available Linear regression is a basic tool in mobile robotics, since it enables accurate estimation of straight lines from range-bearing scans or in digital images, which is a prerequisite for reliable data association and sensor fusing in the context of feature-based SLAM. This paper discusses, extends and compares existing algorithms for line fitting applicable also in the case of strong covariances between the coordinates at each single data point, which must not be neglected if range-bearing sensors are used. Besides, in particular, the determination of the covariance matrix is considered, which is required for stochastic modeling. The main contribution is a new error model of straight lines in closed form for calculating quickly and reliably the covariance matrix dependent on just a few comprehensible and easily-obtainable parameters. The model can be applied widely in any case when a line is fitted from a number of distinct points also without a priori knowledge of the specific measurement noise. By means of extensive simulations, the performance and robustness of the new model in comparison to existing approaches is shown.

  6. Navigating ethics of physician-patient confidentiality: a communication privacy management analysis.

    Science.gov (United States)

    Petronio, Sandra; Dicorcia, Mark J; Duggan, Ashley

    2012-01-01

    The ethics of physician-patient confidentiality is often fraught with contradictions. Privacy boundaries are not always clear, and patients can leave an interaction with their physicians feeling uncomfortable about the security of their private medical information. The best way to meet confidentiality and privacy management expectations that patients have may not be readily apparent. Without realizing it, a physician may communicate a patient's information in ways that are inconsistent with that person's perceptions of how his/her medical information should be treated. A proposed model is presented as a tool for physicians to better serve the privacy and confidentiality needs of their patients. This model depends on the communication privacy management (CPM) perspective that emerged from a 35-year research program investigating how people regulate and control information they consider private and confidential. A physician's use of this model enables the ability to establish a confidentiality pledge that can address issues in understanding the best way to communicate about privacy management with patients and more likely overcome potential negative outcomes.

  7. Youth, Privacy and Online Media: Framing the right to privacy in public policy-making

    DEFF Research Database (Denmark)

    Hasselbalch, Gry; Jørgensen, Rikke Frank

    2015-01-01

    policy making that the right to privacy is challenged in new ways in a structurally transformed online public sphere, the way in which it has been framed does not seem to acknowledge this transformation. This paper therefore argues for a reformulation of “online privacy” in the current global policy...... online privacy....

  8. The Privacy Problem: Although School Librarians Seldom Discuss It, Students' Privacy Rights Are under Attack

    Science.gov (United States)

    Adams, Helen R.

    2011-01-01

    Every day in school libraries nationwide, students' privacy rights are under attack, but many principals, teachers, parents, and community members do not know much about these rights. Even though school librarians are among the strongest proponents of privacy, the subject is rarely discussed, probably because state and federal laws can be…

  9. Privacy by Design: An alternative to existing practice in safeguarding privacy

    NARCIS (Netherlands)

    Lieshout, M.J. van; Kool, L.; Schoonhoven, B. van; Jonge, M. de

    2011-01-01

    Purpose: The purpose of this paper is to develop/elaborate the concept Privacy by Design (PbD) and to explore the validity of the PbD framework. Design/methodology/approach: Attention for alternative concepts, such as PbD, which might offer surplus value in safeguarding privacy, is growing. Using

  10. Privacy Issues: Journalists Should Balance Need for Privacy with Need to Cover News.

    Science.gov (United States)

    Plopper, Bruce

    1998-01-01

    Notes that journalists have to balance their desire to print the news with personal rights to privacy. Argues that a working knowledge of ethics and law helps journalism students resolve such issues. Discusses ethical issues; legal aspects of privacy; and "training" administrators. Offers a list of questions to ask, six notable court…

  11. Privacy as virtue: searching for a new privacy paradigm in the age of Big Data

    NARCIS (Netherlands)

    van der Sloot, B.; Beyvers, E.; Helm, P.; Hennig, M.; Keckeis, C.; Kreknin, I.; Püschel, F.

    2017-01-01

    Originally, privacy was conceived primarily as a duty of the state not to abuse its powers It could not, for example, enter a private house without legitimate reason or reasonable suspicion that the owner of the house had engaged in, for example, criminal conduct Gradually, however, privacy has been

  12. The Role of Glass in Interior Architecture: Aesthetics, Community, and Privacy

    Science.gov (United States)

    Ziff, Matthew

    2004-01-01

    Advances in glass technologies are being applied in contemporary interior architecture. Glass forms and surfaces are appearing in settings and applications that offer vivid aesthetic experiences for users, but create ambiguous messages concerning community and privacy. Where a modernist application of glass may have been directed toward creating a…

  13. A New Look at The Right to Privacy: Case Snowden and legal postmodernity

    Directory of Open Access Journals (Sweden)

    José Isaac Pilati

    2014-12-01

    Full Text Available http://dx.doi.org/10.5007/2177-7055.2014v35n69p281 Edward Snowden was responsible for the disclosure of the data collection program developed by the National Security Agency. This sparked a strong debate on new forms of violation of the right to privacy, which demonstrates the need to adapt the law to the reality resulting from technological innovations. In this new technological context, this article is based on the Snowden case to discuss the political and legal issues of privacy. The doctrinal approach to the topic is updated and proposes a theoretical approach to privacy as collective good in the Legal Theory of Postmodernism, a new paradigm.

  14. The War Against Terror and Transatlantic Information Sharing: Spillovers of Privacy or Spillovers of Security?

    Directory of Open Access Journals (Sweden)

    Maria Tzanou

    2015-02-01

    Full Text Available The EU-US Passenger Name Record (PNR agreement has been among the most controversial instruments in the fight against terrorism that the EU negotiated with the US after the 9/11 terrorist attacks. The agreement has been heavily criticised for its implications regarding fundamental rights, in particular the rights to privacy and data protection. Nevertheless, the EU has put forward plans to develop its own PNR programme. The present article aims to examine the new dynamics concerning privacy that arise from the transatlantic fight against terrorism. It argues that, while attempts for the development of a transatlantic privacy protection framework have been made, ‘spillovers’ of security, taking the form of internalisation of external counter-terrorism measures, are prevalent in the era of the war against terror.

  15. An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds

    Energy Technology Data Exchange (ETDEWEB)

    Simmhan, Yogesh; Kumbhare, Alok; Cao, Baohua; Prasanna, Viktor K.

    2011-07-09

    Power utilities globally are increasingly upgrading to Smart Grids that use bi-directional communication with the consumer to enable an information-driven approach to distributed energy management. Clouds offer features well suited for Smart Grid software platforms and applications, such as elastic resources and shared services. However, the security and privacy concerns inherent in an information rich Smart Grid environment are further exacerbated by their deployment on Clouds. Here, we present an analysis of security and privacy issues in a Smart Grids software architecture operating on different Cloud environments, in the form of a taxonomy. We use the Los Angeles Smart Grid Project that is underway in the largest U.S. municipal utility to drive this analysis that will benefit both Cloud practitioners targeting Smart Grid applications, and Cloud researchers investigating security and privacy.

  16. Relativistic quark model and behaviour of the meson electromagnetic form factors at small and intermediate momentum transfer Q2

    International Nuclear Information System (INIS)

    Bagdasaryan, A.S.; Esaybegyan, S.V.; Ter-Isaakyan, N.L.

    1982-01-01

    In a model of hadrons composed of relativistic quarks a description of meson static characteristics and pion electromagnetic form factor in the range of small and intermediate values of momentum transfer 0 2 2 have obtained. It is shown that in such a model the data available on the pion electromagnetic form factor may be described basing on a simplest quark without gluon exchange. The contribution of a one-gluon exchange diagram in such a model cannot exceed 30%

  17. SafePub: A Truthful Data Anonymization Algorithm With Strong Privacy Guarantees

    Directory of Open Access Journals (Sweden)

    Bild Raffael

    2018-01-01

    Full Text Available Methods for privacy-preserving data publishing and analysis trade off privacy risks for individuals against the quality of output data. In this article, we present a data publishing algorithm that satisfies the differential privacy model. The transformations performed are truthful, which means that the algorithm does not perturb input data or generate synthetic output data. Instead, records are randomly drawn from the input dataset and the uniqueness of their features is reduced. This also offers an intuitive notion of privacy protection. Moreover, the approach is generic, as it can be parameterized with different objective functions to optimize its output towards different applications. We show this by integrating six well-known data quality models. We present an extensive analytical and experimental evaluation and a comparison with prior work. The results show that our algorithm is the first practical implementation of the described approach and that it can be used with reasonable privacy parameters resulting in high degrees of protection. Moreover, when parameterizing the generic method with an objective function quantifying the suitability of data for building statistical classifiers, we measured prediction accuracies that compare very well with results obtained using state-of-the-art differentially private classification algorithms.

  18. Anonymising the Sparse Dataset: A New Privacy Preservation Approach while Predicting Diseases

    Directory of Open Access Journals (Sweden)

    V. Shyamala Susan

    2016-09-01

    Full Text Available Data mining techniques analyze the medical dataset with the intention of enhancing patient’s health and privacy. Most of the existing techniques are properly suited for low dimensional medical dataset. The proposed methodology designs a model for the representation of sparse high dimensional medical dataset with the attitude of protecting the patient’s privacy from an adversary and additionally to predict the disease’s threat degree. In a sparse data set many non-zero values are randomly spread in the entire data space. Hence, the challenge is to cluster the correlated patient’s record to predict the risk degree of the disease earlier than they occur in patients and to keep privacy. The first phase converts the sparse dataset right into a band matrix through the Genetic algorithm along with Cuckoo Search (GCS.This groups the correlated patient’s record together and arranges them close to the diagonal. The next segment dissociates the patient’s disease, which is a sensitive value (SA with the parameters that determine the disease normally Quasi Identifier (QI.Finally, density based clustering technique is used over the underlying data to  create anonymized groups to maintain privacy and to predict the risk level of disease. Empirical assessments on actual health care data corresponding to V.A.Medical Centre heart disease dataset reveal the efficiency of this model pertaining to information loss, utility and privacy.

  19. Modeling tracers of young stellar population age in star-forming galaxies

    International Nuclear Information System (INIS)

    Levesque, Emily M.; Leitherer, Claus

    2013-01-01

    The young stellar population of a star-forming galaxy is the primary engine driving its radiative properties. As a result, the age of a galaxy's youngest generation of stars is critical for a detailed understanding of its star formation history, stellar content, and evolutionary state. Here we present predicted equivalent widths for the Hβ, Hα, and Brγ recombination lines as a function of stellar population age. The equivalent widths are produced by the latest generations of stellar evolutionary tracks and the Starburst99 stellar population synthesis code, and are the first to fully account for the combined effects of both nebular emission and continuum absorption produced by the synthetic stellar population. Our grid of model stellar populations spans six metallicities (0.001 < Z < 0.04), two treatments of star formation history (a 10 6 M ☉ instantaneous burst and a continuous star formation rate of 1 M ☉ yr –1 ), and two different treatments of initial rotation rate (v rot = 0.0v crit and 0.4v crit ). We also investigate the effects of varying the initial mass function. Given constraints on galaxy metallicity, our predicted equivalent widths can be applied to observations of star-forming galaxies to approximate the age of their young stellar populations.

  20. Forming a new clinical team for frail older people: can a group development model help?

    Science.gov (United States)

    Anderson, Elizabeth Susan; Pollard, Lorraine; Conroy, Simon; Clague-Baker, Nicola

    2014-03-01

    Integrated services which utilise the expertise of team members along care pathways are evolving. Changes in service structure and subsequent team working arrangements can be a challenge for practitioners expected to redefine how they work with one another. These services are particularly important for the care of frail older people. This exploratory study of one newly forming team presents the views of staff involved in establishing an interprofessional healthcare advisory team for older people within an acute hospital admissions unit. Staff experiences of forming a new service are aligned to a model of team development. The findings are presented as themes relating to the stages of team development and identify the challenges of setting up an integrated service alongside existing services. In particular, team process issues relating to the clarity of goals, role clarification, leadership, team culture and identity. Managers must allow time to ensure new services evolve before setting up evaluation studies for efficiency and effectiveness which might prove against the potential for interprofessional teamworking.

  1. Chemical modelling of glycolaldehyde and ethylene glycol in star-forming regions

    Science.gov (United States)

    Coutens, A.; Viti, S.; Rawlings, J. M. C.; Beltrán, M. T.; Holdship, J.; Jiménez-Serra, I.; Quénard, D.; Rivilla, V. M.

    2018-04-01

    Glycolaldehyde (HOCH2CHO) and ethylene glycol ((CH2OH)2) are two complex organic molecules detected in the hot cores and hot corinos of several star-forming regions. The ethylene glycol/glycolaldehyde abundance ratio seems to show an increase with the source luminosity. In the literature, several surface-chemistry formation mechanisms have been proposed for these two species. With the UCLCHEM chemical code, we explored the different scenarios and compared the predictions for a range of sources of different luminosities with the observations. None of the scenarios reproduce perfectly the trend. A better agreement is, however, found for a formation through recombination of two HCO radicals followed by successive hydrogenations. The reaction between HCO and CH2OH could also contribute to the formation of glycolaldehyde in addition to the hydrogenation pathway. The predictions are improved when a trend of decreasing H2 density within the core region with T≥100 K as a function of luminosity is included in the model. Destruction reactions of complex organic molecules in the gas phase would also need to be investigated, since they can affect the abundance ratios once the species have desorbed in the warm inner regions of the star-forming regions.

  2. Tensor formulation of the model equations on strong conservation form for an incompressible flow in general coordinates

    DEFF Research Database (Denmark)

    Jørgensen, Bo Hoffmann

    2003-01-01

    This brief report expresses the basic equations of an incompressible flow model in a form which can be translated easily into the form used by a numerical solver. The application of tensor notation makes is possible to effectively address the issue ofnumerical robustness and stating the model equ...... form of the equations is included which allows for special solutions to be developed in the transformedcoordinate system. Examples of applications are atmospheric flows over complex terrain, aerodynamically flows, industrial flows and environmental flows.......This brief report expresses the basic equations of an incompressible flow model in a form which can be translated easily into the form used by a numerical solver. The application of tensor notation makes is possible to effectively address the issue ofnumerical robustness and stating the model...

  3. Simple Theory for the Dynamics of Mean-Field-Like Models of Glass-Forming Fluids.

    Science.gov (United States)

    Szamel, Grzegorz

    2017-10-13

    We propose a simple theory for the dynamics of model glass-forming fluids, which should be solvable using a mean-field-like approach. The theory is based on transparent physical assumptions, which can be tested in computer simulations. The theory predicts an ergodicity-breaking transition that is identical to the so-called dynamic transition predicted within the replica approach. Thus, it can provide the missing dynamic component of the random first order transition framework. In the large-dimensional limit the theory reproduces the result of a recent exact calculation of Maimbourg et al. [Phys. Rev. Lett. 116, 015902 (2016)PRLTAO0031-900710.1103/PhysRevLett.116.015902]. Our approach provides an alternative, physically motivated derivation of this result.

  4. Simple Theory for the Dynamics of Mean-Field-Like Models of Glass-Forming Fluids

    Science.gov (United States)

    Szamel, Grzegorz

    2017-10-01

    We propose a simple theory for the dynamics of model glass-forming fluids, which should be solvable using a mean-field-like approach. The theory is based on transparent physical assumptions, which can be tested in computer simulations. The theory predicts an ergodicity-breaking transition that is identical to the so-called dynamic transition predicted within the replica approach. Thus, it can provide the missing dynamic component of the random first order transition framework. In the large-dimensional limit the theory reproduces the result of a recent exact calculation of Maimbourg et al. [Phys. Rev. Lett. 116, 015902 (2016), 10.1103/PhysRevLett.116.015902]. Our approach provides an alternative, physically motivated derivation of this result.

  5. Privacy, Individual Liberty, and the Public Interest. Looking at the Law.

    Science.gov (United States)

    Ryan, John Paul

    2000-01-01

    Explores the issue of privacy focusing on informational privacy and how it could be jeopardized by new technologies. Provides contexts of privacy and discusses privacy and celebrity in U.S. culture, privacy abuses, and privacy as a common value. Includes teaching activities by Michelle Parrini and Jennifer Kittlaus. (CMK)

  6. Before the endless forms: embodied model of transition from single cells to aggregates to ecosystem engineering.

    Directory of Open Access Journals (Sweden)

    Ricard V Solé

    Full Text Available The emergence of complex multicellular systems and their associated developmental programs is one of the major problems of evolutionary biology. The advantages of cooperation over individuality seem well known but it is not clear yet how such increase of complexity emerged from unicellular life forms. Current multicellular systems display a complex cell-cell communication machinery, often tied to large-scale controls of body size or tissue homeostasis. Some unicellular life forms are simpler and involve groups of cells cooperating in a tissue-like fashion, as it occurs with biofilms. However, before true gene regulatory interactions were widespread and allowed for controlled changes in cell phenotypes, simple cellular colonies displaying adhesion and interacting with their environments were in place. In this context, models often ignore the physical embedding of evolving cells, thus leaving aside a key component. The potential for evolving pre-developmental patterns is a relevant issue: how far a colony of evolving cells can go? Here we study these pre-conditions for morphogenesis by using CHIMERA, a physically embodied computational model of evolving virtual organisms in a pre-Mendelian world. Starting from a population of identical, independent cells moving in a fluid, the system undergoes a series of changes, from spatial segregation, increased adhesion and the development of generalism. Eventually, a major transition occurs where a change in the flow of nutrients is triggered by a sub-population. This ecosystem engineering phenomenon leads to a subsequent separation of the ecological network into two well defined compartments. The relevance of these results for evodevo and its potential ecological triggers is discussed.

  7. Therapeutic Potential of Human-Derived Endothelial Colony-Forming Cells in Animal Models.

    Science.gov (United States)

    Tasev, Dimitar; Koolwijk, Pieter; van Hinsbergh, Victor W M

    2016-10-01

    Tissue regeneration requires proper vascularization. In vivo studies identified that the endothelial colony-forming cells (ECFCs), a subtype of endothelial progenitor cells that can be isolated from umbilical cord or peripheral blood, represent a promising cell source for therapeutic neovascularization. ECFCs not only are able to initiate and facilitate neovascularization in diseased tissue but also can, by acting in a paracrine manner, contribute to the creation of favorable conditions for efficient and appropriate differentiation of tissue-resident stem or progenitor cells. This review outlines the progress in the field of in vivo regenerative and tissue engineering studies and surveys why, when, and how ECFCs can be used for tissue regeneration. Reviewed literature that regard human-derived ECFCs in xenogeneic animal models implicates that ECFCs should be considered as an endothelial cell source of preference for induction of neovascularization. Their neovascularization and regenerative potential is augmented in combination with other types of stem or progenitor cells. Biocompatible scaffolds prevascularized with ECFCs interconnect faster and better with the host vasculature. The physical incorporation of ECFCs in newly formed blood vessels grants prolonged release of trophic factors of interest, which also makes ECFCs an interesting cell source candidate for gene therapy and delivery of bioactive compounds in targeted area. ECFCs possess all biological features to be considered as a cell source of preference for tissue engineering and repair of blood supply. Investigation of regenerative potential of ECFCs in autologous settings in large animal models before clinical application is the next step to clearly outline the most efficient strategy for using ECFCs as treatment.

  8. Accurate anisotropic material modelling using only tensile tests for hot and cold forming

    Science.gov (United States)

    Abspoel, M.; Scholting, M. E.; Lansbergen, M.; Neelis, B. M.

    2017-09-01

    Accurate material data for simulations require a lot of effort. Advanced yield loci require many different kinds of tests and a Forming Limit Curve (FLC) needs a large amount of samples. Many people use simple material models to reduce the effort of testing, however some models are either not accurate enough (i.e. Hill’48), or do not describe new types of materials (i.e. Keeler). Advanced yield loci describe the anisotropic materials behaviour accurately, but are not widely adopted because of the specialized tests, and data post-processing is a hurdle for many. To overcome these issues, correlations between the advanced yield locus points (biaxial, plane strain and shear) and mechanical properties have been investigated. This resulted in accurate prediction of the advanced stress points using only Rm, Ag and r-values in three directions from which a Vegter yield locus can be constructed with low effort. FLC’s can be predicted with the equations of Abspoel & Scholting depending on total elongation A80, r-value and thickness. Both predictive methods are initially developed for steel, aluminium and stainless steel (BCC and FCC materials). The validity of the predicted Vegter yield locus is investigated with simulation and measurements on both hot and cold formed parts and compared with Hill’48. An adapted specimen geometry, to ensure a homogeneous temperature distribution in the Gleeble hot tensile test, was used to measure the mechanical properties needed to predict a hot Vegter yield locus. Since for hot material, testing of stress states other than uniaxial is really challenging, the prediction for the yield locus adds a lot of value. For the hot FLC an A80 sample with a homogeneous temperature distribution is needed which is due to size limitations not possible in the Gleeble tensile tester. Heating the sample in an industrial type furnace and tensile testing it in a dedicated device is a good alternative to determine the necessary parameters for the FLC

  9. Modeling glacier beds in the Austrian Alps: How many lakes will form in future?

    Science.gov (United States)

    Koehler, Dominik; Geilhausen, Martin; Linsbauer, Andreas

    2014-05-01

    Glacial retreat exposes landscapes with relief characteristics greatly differing from the former ice covered surfaces. If glacial retreat exposes natural basins capable of forming proglacial lakes, then the downstream hydrologic and geomorphic systems in such catchments will be significantly altered due to discharge modifications, sediment trapping, decoupling effects and long term sediment storage (e.g. Geilhausen et al. 2013). Further implications are related to hydropower management, tourism and natural hazards. Consequently, sound knowledge of present day glacier beds ("proglacial zones of tomorrow") and in particular the total number, locations and characteristics of overdeepenings are of importance. For Austria, however, this important information about significant future changes of high alpine regions is yet missing. An interdisciplinary research project is currently in preparation to close this gap. This paper presents results of a pilot study. We used a novel GIS-based approach (GlabTop, cf. Linsbauer et al. 2012) to compute approximate glacier beds in the Austrian Alps. GlabTop ('Glacier bed Topography') is based on an empirical relation between average basal shear stress and elevation range of individual glaciers and makes use of digital elevation models (DEM), glacier outlines and branch lines (i.e. a set of lines covering all important glacier branches). DEMs and glacier outlines were derived from the Austrian glacier inventory (1998) and branch lines were manually digitized. The inventory includes 911 glaciers of which 876 (96%) were considered and 35 were excluded due to size restrictions ( 0.01 km²) with the potential of forming proglacial lakes when glacier retreat reveals the bed. The total area and volume of all overdeepenings is approx. 10 km² and 236 Mio m³ respectively and 33 lakes will be larger than 1 km³. A total glacier volume of 16 ± 5 km³ with an average ice thickness of 36 ± 11 m was calculated for 1998. Comparisons with

  10. Visual privacy by context: proposal and evaluation of a level-based visualisation scheme.

    Science.gov (United States)

    Padilla-López, José Ramón; Chaaraoui, Alexandros Andre; Gu, Feng; Flórez-Revuelta, Francisco

    2015-06-04

    Privacy in image and video data has become an important subject since cameras are being installed in an increasing number of public and private spaces. Specifically, in assisted living, intelligent monitoring based on computer vision can allow one to provide risk detection and support services that increase people's autonomy at home. In the present work, a level-based visualisation scheme is proposed to provide visual privacy when human intervention is necessary, such as at telerehabilitation and safety assessment applications. Visualisation levels are dynamically selected based on the previously modelled context. In this way, different levels of protection can be provided, maintaining the necessary intelligibility required for the applications. Furthermore, a case study of a living room, where a top-view camera is installed, is presented. Finally, the performed survey-based evaluation indicates the degree of protection provided by the different visualisation models, as well as the personal privacy preferences and valuations of the users.

  11. STRUCTURAL AND FUNCTIONAL MODEL OF FORMING INFORMATIONAL COMPETENCE OF TECHNICAL UNIVERSITY STUDENTS

    Directory of Open Access Journals (Sweden)

    Taras Ostapchuk

    2016-11-01

    Full Text Available The article elaborates and analyses the structural and functional model of formation of information competence of technical university students. The system and mutual relationships between its elements are revealed. It is found out that the presence of the target structure of the proposed model, process and result-evaluative blocks ensure its functioning and the opportunity to optimize the learning process for technical school students’ information training. It is established that the formation of technical university students’ information competence based on components such as motivational value, as well as operational activity, cognitive, and reflexive one. These criteria (motivation, operational and activity, cognitive, reflective, indexes and levels (reproductive, technologized, constructive forming technical university students’ information competence are disclosed. Expediency of complex organizational and educational conditions in the stages of information competence is justified. The complex organizational and pedagogical conditions include: orientation in the organization and implementation of class work for technical university students’ positive value treatment; the issue of forming professionalism; informatization of educational and socio-cultural environment of higher technical educational institutions; orientation of technical university students’ training to the demands of European and international standards on information competence as a factor in the formation of competitiveness at the labor market; introducing a special course curriculum that will provide competence formation due to the use of information technology in professional activities. Forms (lecture, visualization, problem lecture, combined lecture, scientific online conference, recitals, excursions, etc., tools (computer lab, multimedia projector, interactive whiteboard, multimedia technology (audio, video, the Internet technologies; social networks, etc

  12. Privacy and confidentiality in pragmatic clinical trials.

    Science.gov (United States)

    McGraw, Deven; Greene, Sarah M; Miner, Caroline S; Staman, Karen L; Welch, Mary Jane; Rubel, Alan

    2015-10-01

    With pragmatic clinical trials, an opportunity exists to answer important questions about the relative risks, burdens, and benefits of therapeutic interventions. However, concerns about protecting the privacy of this information are significant and must be balanced with the imperative to learn from the data gathered in routine clinical practice. Traditional privacy protections for research uses of identifiable information rely disproportionately on informed consent or authorizations, based on a presumption that this is necessary to fulfill ethical principles of respect for persons. But frequently, the ideal of informed consent is not realized in its implementation. Moreover, the principle of respect for persons—which encompasses their interests in health information privacy—can be honored through other mechanisms. Data anonymization also plays a role in protecting privacy but is not suitable for all research, particularly pragmatic clinical trials. In this article, we explore both the ethical foundation and regulatory framework intended to protect privacy in pragmatic clinical trials. We then review examples of novel approaches to respecting persons in research that may have the added benefit of honoring patient privacy considerations. © The Author(s) 2015.

  13. Smart Grid Privacy through Distributed Trust

    Science.gov (United States)

    Lipton, Benjamin

    Though the smart electrical grid promises many advantages in efficiency and reliability, the risks to consumer privacy have impeded its deployment. Researchers have proposed protecting privacy by aggregating user data before it reaches the utility, using techniques of homomorphic encryption to prevent exposure of unaggregated values. However, such schemes generally require users to trust in the correct operation of a single aggregation server. We propose two alternative systems based on secret sharing techniques that distribute this trust among multiple service providers, protecting user privacy against a misbehaving server. We also provide an extensive evaluation of the systems considered, comparing their robustness to privacy compromise, error handling, computational performance, and data transmission costs. We conclude that while all the systems should be computationally feasible on smart meters, the two methods based on secret sharing require much less computation while also providing better protection against corrupted aggregators. Building systems using these techniques could help defend the privacy of electricity customers, as well as customers of other utilities as they move to a more data-driven architecture.

  14. Anonymity versus privacy: Selective information sharing in online cancer communities

    NARCIS (Netherlands)

    Frost, J.H.; Vermeulen, I.E.; Beekers, N.

    2014-01-01

    Background: Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient

  15. How socially aware are social media privacy controls?

    OpenAIRE

    Misra, Gaurav; Such Aparicio, Jose Miguel

    2016-01-01

    Social media sites are key mediators of online communication. Yet the privacy controls for these sites are not fully socially aware, even when privacy management is known to be fundamental to successful social relationships.

  16. Ideal flow theory for the double – shearing model as a basis for metal forming design

    Science.gov (United States)

    Alexandrov, S.; Trung, N. T.

    2018-02-01

    In the case of Tresca’ solids (i.e. solids obeying the Tresca yield criterion and its associated flow rule) ideal flows have been defined elsewhere as solenoidal smooth deformations in which an eigenvector field associated everywhere with the greatest principal stress (and strain rate) is fixed in the material. Under such conditions all material elements undergo paths of minimum plastic work, a condition which is often advantageous for metal forming processes. Therefore, the ideal flow theory is used as the basis of a procedure for the preliminary design of such processes. The present paper extends the theory of stationary planar ideal flow to pressure dependent materials obeying the double shearing model and the double slip and rotation model. It is shown that the original problem of plasticity reduces to a purely geometric problem. The corresponding system of equations is hyperbolic. The characteristic relations are integrated in elementary functions. In regions where one family of characteristics is straight, mapping between the principal lines and Cartesian coordinates is determined by linear ordinary differential equations. An illustrative example is provided.

  17. The Privacy Attitude Questionnaire (PAQ): Initial Development and Validation

    OpenAIRE

    Chignell, Mark H.; Quan-Haase, Anabel; Gwizdka, Jacek

    2003-01-01

    Privacy has been identified as a key issue in a variety of domains, including electronic commerce and public policy. While there are many discussions of privacy issues from a legal and policy perspective, there is little information on the structure of privacy as a psychometric construct. Our goal is to develop a method for measuring attitudes towards privacy that can guide the design and personalization of services. This paper reports on the development of an initial version of the PAQ. Four...

  18. An Approach for Location privacy in Pervasive Computing Environment

    OpenAIRE

    Sudheer Kumar Singh; Alka Jindal

    2010-01-01

    This paper focus on location privacy in location based services, Location privacy is a particular type of information privacy that can be defined as the ability to prevent others from learning one’s current or past location. Many systems such as GPS implicitly and automatically give its users location privacy. Once user sends his or her current location to the application server, Application server stores current locations of users in application server database. User can not delete or modify...

  19. Analysis of the Rising Threat of Subverting Privacy Technologies

    OpenAIRE

    Ellis, Craig

    2017-01-01

    Privacy technologies have become extremely prevalent in recent years from secure communication channels to the Tor network. These technologies were designed to provide privacy and security for users, but these ideals have also led to increased criminal use of the technologies. Privacy and anonymity are always sought after by criminals, making these technologies the perfect vehicles for committing crimes on the Internet. This paper will analyze the rising threat of subverting privacy technolog...

  20. How do salt withdrawal minibasins form? Insights from forward modelling, and implications for hydrocarbon migration

    Science.gov (United States)

    Peel, Frank J.

    2014-09-01

    Existing models for the initiation of salt withdrawal minibasins focus on the role of triggers that exist within the minibasin, either stratigraphic (e.g. differential deposition) or tectonic (extension, translation or contraction). Existing studies tend to focus on complex settings, such as continental margins, which contain many different potential triggering mechanisms. It can be difficult in these settings to identify which process is responsible for minibasin initiation, or the influence of individual factors on their subsequent development. Salt withdrawal minibasins also exist in simpler settings, without any obvious intrinsic trigger; the region of the North German Basin used by Trusheim (1960) in the classic definition of salt withdrawal geometries was of this nature. There is no overall basal or surface slope, no major lateral movement, and there is no depositional heterogeneity. Previously recognized trigger processes for minibasin initiation do not apply in this benign setting, suggesting that other, potentially more fundamental, influences may be at work. A simple forward-modelling approach shows how, in the absence of any other mechanism, a new minibasin can develop as the consequence of salt movement driven by its neighbour, and families of withdrawal minibasins can propagate across a region from a single seed point. This new mechanism may explain how some minibasins appear to initiate before the sediment density has exceeded that of the underlying salt. The forward modelling also indicates that some minibasins begin to invert to form turtle anticlines before the underlying salt has been evacuated, so that the timing of turtle formation may not be diagnostic of weld formation. This mechanism may also give rise to salt-cored turtles that have a lens of salt trapped beneath their cores. These new findings have implications for hydrocarbon migration and trapping.