WorldWideScience

Sample records for naming contest privacy

  1. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy

    Science.gov (United States)

    Koopman, Colin; Doty, Nick

    2016-01-01

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy’s disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy’s essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy’s multiple uses across multiple contexts. This article is part of the themed issue ‘The ethical impact of data science’. PMID:28336797

  2. European Space Agency announces contest to "Name the Cluster Quartet"

    Science.gov (United States)

    2000-02-01

    1. Contest rules The European Space Agency (ESA) is launching a public competition to find the most suitable names for its four Cluster II space weather satellites. The quartet, which are currently known as flight models 5, 6, 7 and 8, are scheduled for launch from Baikonur Space Centre in Kazakhstan in June and July 2000. Professor Roger Bonnet, ESA Director of Science Programme, announced the competition for the first time to the European Delegations on the occasion of the Science Programme Committee (SPC) meeting held in Paris on 21-22 February 2000. The competition is open to people of all the ESA member states (*). Each entry should include a set of FOUR names (places, people, or things from history, mythology, or fiction, but NOT living persons). Contestants should also describe in a few sentences why their chosen names would be appropriate for the four Cluster II satellites. The winners will be those which are considered most suitable and relevant for the Cluster II mission. The names must not have been used before on space missions by ESA, other space organizations or individual countries. One winning entry per country will be selected to go to the Finals of the competition. The prize for each national winner will be an invitation to attend the first Cluster II launch event in mid-June 2000 with their family (4 persons) in a 3-day trip (including excursions to tourist sites) to one of these ESA establishments: ESRIN (near Rome, Italy): winners from France, Ireland, United Kingdom, Belgium. VILSPA (near Madrid, Spain): winners from The Netherlands, Norway, Sweden, Finland. ESTEC (near Amsterdam, The Netherlands): winners from Germany, Denmark, Switzerland, Austria. ESOC (in the Rhine Valley, Germany): winners from Italy, Spain , Portugal. During the first Cluster II launch event (June 2000) the chosen four names for the spacecraft will be announced. The grand prize will be: * a trip for the winner and family (4 people) to Paris where ESA's headquarters are

  3. Healing speech, wandering names, contests of words : ideas about language in Euripides

    NARCIS (Netherlands)

    Caspers, Christiaan Leopold

    2011-01-01

    Ideas about language in Euripides include, among many others, the claim that “honourable speech is a medicine for man’s fear”; the observation that “no one can judge a case... before having learned both sides’ story”; and the notion that “a name may be in many places, but not a body”. It is among

  4. Contested Namesakes: East Berlin School Names under Communism and in Reunified Germany

    Science.gov (United States)

    Plum, Catherine

    2005-01-01

    In this article, the author discusses how the municipal authorities eliminate the names of all schools in eastern Berlin in 1990 to formalize the spontaneous purge of school identities. She added, that the renaming of primary and secondary schools at this historical juncture provides a unique vantage point for examining what the democratic turning…

  5. Contested Rivers

    DEFF Research Database (Denmark)

    Gorm Hansen, Louise Lyngfeldt

    In recent years, hydropower and the sustainability of large hydropower projects has become a contested field. While for example hydropower companies maintain that hydropower is a renewable and sustainable source of electricity, a number of NGOs sharply question this assumption. The paper explores...... policy making, decision drivers and framing of large hydropower projects in China. Hydropower is a complex and interesting field to explore as the consequences go beyond the immediate locality and interacts with local as well as the global contexts. Inspired by Tsing (2003) and Zhan (2008) the paper...... and natural scientists and Chinese hydropower companies (to name a few). The paper maps different actors’ framing of the issue to gain a deeper understanding of the complexities of hydropower policymaking in China, as well as map the local consequences of global policymaking about large hydropower...

  6. Contested Categories

    DEFF Research Database (Denmark)

    Drawing on social science perspectives, Contested Categories presents a series of empirical studies that engage with the often shifting and day-to-day realities of life sciences categories. In doing so, it shows how such categories remain contested and dynamic, and that the boundaries they create...

  7. Biometrics, e-identity, and the balance between security and privacy: case study of the passenger name record (PNR) system.

    Science.gov (United States)

    Nouskalis, G

    2011-03-01

    The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces) can be used in order to verify a passenger's identity. The proposed Passenger Name Record (PNR) system contains all the information necessary to enable reservations to be processed and controlled by the booking and participating air carriers for each journey booked by or on behalf of any person. PNR data are related to travel movements, usually flights, and include passport data, name, address, telephone numbers, travel agent, credit card number, history of changes in the flight schedule, seat preferences, and other information. In the aftermath of the September 11 attacks, a new emergency political-law status of society was established: the continuous state of "war" against the so-called unlawful combatants of the "enemy". Officially, the enemy is the terrorists, but the victims of the privacy invasions caused by the above new form of data processing are the civilians. The data processing based on biometrics is covered both by Directive 95/46 EC and Article 8 of the Convention on the Protection of Human Rights and Fundamental Freedoms (now the European Convention on Human Rights, "ECHR"). According to Article 2, Paragraph a of the above Directive, personal data shall mean any information relating to an identified or identifiable natural person; an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his/her physical, physiological, mental, economic, cultural, or social identity.

  8. Biometrics, e-Identity, and the Balance between Security and Privacy: Case Study of the Passenger Name Record (PNR System

    Directory of Open Access Journals (Sweden)

    G. Nouskalis

    2011-01-01

    Full Text Available The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces can be used in order to verify a passenger's identity. The proposed Passenger Name Record (PNR system contains all the information necessary to enable reservations to be processed and controlled by the booking and participating air carriers for each journey booked by or on behalf of any person. PNR data are related to travel movements, usually flights, and include passport data, name, address, telephone numbers, travel agent, credit card number, history of changes in the flight schedule, seat preferences, and other information. In the aftermath of the September 11 attacks, a new emergency political-law status of society was established: the continuous state of “war” against the so-called unlawful combatants of the “enemy”. Officially, the enemy is the terrorists, but the victims of the privacy invasions caused by the above new form of data processing are the civilians. The data processing based on biometrics is covered both by Directive 95/46 EC and Article 8 of the Convention on the Protection of Human Rights and Fundamental Freedoms (now the European Convention on Human Rights, “ECHR”. According to Article 2, Paragraph a of the above Directive, personal data shall mean any information relating to an identified or identifiable natural person; an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his/her physical, physiological, mental, economic, cultural, or social identity.

  9. Contest Physics.

    Science.gov (United States)

    Moehnke, Randy

    1994-01-01

    Discusses the use of contests to keep physics interesting and exciting for the students. Includes: balloon car, egg drop, tennis ball catapult, bridge building, mousetrap vehicle, musical instrument, slide photo, electric junk dissection, windmill generator, and solar heater. (MVL)

  10. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  11. Contesting Citizenship

    DEFF Research Database (Denmark)

    The new book shows how citizenship, its meaning and form, have become a vital site of contestation. While many minority groups struggle to redefine the rights of citizenship in more pluralized forms, the responsivbilities of citizenship are being reaffirmed by democratic governments concerned to ...

  12. Contestable Licensing

    OpenAIRE

    Zvika Neeman; Gerhard O. Orosel

    2000-01-01

    We analyze a model of repeated franchise bidding for natural monopoly with contestable licensing - a franchisee halds an (exclusive) license to operate a franchise until another rm offers to pay more for it. In a world where quality is observable but not veri able, the simple regulatory scheme we describe combines market-like incentives with regulatory oversight to generate efficient outcomes.

  13. Contested collaboration

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    1995-01-01

    . The model describes design phases, roles, themes, and intergroup communication networks as they evolve throughout the design process and characterizes design as a process of "contested collaboration". It is a first step towards a predictive design model that suggests strategies which may help participants...

  14. Contesting danger

    DEFF Research Database (Denmark)

    Heathershaw, John; Megoran, Nick

    2011-01-01

    and subsequent considerations of the region in terms of the war on terror. It considers several examples of this discourse of danger including the popular US TV drama about presidential politics, The West Wing, the policy texts of ‘Washingtonian security analysis’ and accounts of danger, insecurity and urban...... of danger is contested within the region. The example of urban violence in Osh, Kyrgyzstan and Jalalabad, Afghanistan in 2010 demonstrates how opportunities to mitigate conflict may have been lost due to the distortions of this discourse of danger. It concludes by raising the challenge to policy...

  15. Centralized vs decentralized contests

    OpenAIRE

    Beviá, Carmen; Corchón, Luis C.

    2015-01-01

    We compare two contests, decentralized in which there are several independent contests with non overlapping contestants and centralized in which all contestants fight for a unique prize which is the sum of all prizes in the small contests. We study the relationship between payoffs and efforts between these two contests. The first author acknowledges financial support from ECO2008-04756 (Grupo Consolidado-C), SGR2014-515 and PROMETEO/2013/037. The second author acknowledges financial suppor...

  16. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2017-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  17. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  18. Advertising and Invasion of Privacy.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  19. The 2016 interferometric imaging beauty contest

    Science.gov (United States)

    Sanchez-Bermudez, J.; Thiébaut, E.; Hofmann, K.-H.; Heininger, M.; Schertl, D.; Weigelt, G.; Millour, F.; Schutz, A.; Ferrari, A.; Vannier, M.; Mary, D.; Young, J.

    2016-08-01

    Image reconstruction in optical interferometry has gained considerable importance for astrophysical studies during the last decade. This has been mainly due to improvements in the imaging capabilities of existing interferometers and the expectation of new facilities in the coming years. However, despite the advances made so far, image synthesis in optical interferometry is still an open field of research. Since 2004, the community has organized a biennial contest to formally test the different methods and algorithms for image reconstruction. In 2016, we celebrated the 7th edition of the "Interferometric Imaging Beauty Contest". This initiative represented an open call to participate in the reconstruction of a selected set of simulated targets with a wavelength-dependent morphology as they could be observed by the 2nd generation of VLTI instruments. This contest represents a unique opportunity to benchmark, in a systematic way, the current advances and limitations in the field, as well as to discuss possible future approaches. In this contribution, we summarize: (a) the rules of the 2016 contest; (b) the different data sets used and the selection procedure; (c) the methods and results obtained by each one of the participants; and (d) the metric used to select the best reconstructed images. Finally, we named Karl-Heinz Hofmann and the group of the Max-Planck-Institut fur Radioastronomie as winners of this edition of the contest.

  20. Rhetoric and Essentially Contested Arguments

    Science.gov (United States)

    Garver, Eugene

    1978-01-01

    Draws a connection between Gallie's essentially contested concepts and Aristotle's account of rhetorical argument by presenting a definition of Essentially Contested Argument which is used as the connecting term between rhetoric and essentially contested concepts and by demonstrating the value of making this connection. (JF)

  1. Most Physically Educated Contest

    Science.gov (United States)

    Mercier, Kevin; Howard, Thomas

    2018-01-01

    It is seldom that the accomplishments of secondary physical education students are celebrated. The Most Physically Educated Contest was developed to allow students from several school districts to gather for appropriate competition and to display the characteristics of physical literacy attained from participation in high-quality physical…

  2. Some Core Contested Concepts

    Science.gov (United States)

    Chomsky, Noam

    2015-01-01

    Core concepts of language are highly contested. In some cases this is legitimate: real empirical and conceptual issues arise. In other cases, it seems that controversies are based on misunderstanding. A number of crucial cases are reviewed, and an approach to language is outlined that appears to have strong conceptual and empirical motivation, and…

  3. Campaigning and Contestation

    DEFF Research Database (Denmark)

    Schwartz, Sander Andreas

    2015-01-01

    This article is a critical study of the Facebook pages of politicians as public spheres using Dahlberg’s notion of contestation. A method is implemented inspired by qualitative content analysis and including focus groups in order to study citizen comments on eight main political candidates...

  4. Privacy Policy

    Science.gov (United States)

    ... Home → NLM Privacy Policy URL of this page: https://medlineplus.gov/privacy.html NLM Privacy Policy To ... out of cookies in the most popular browsers, http://www.usa.gov/optout_instructions.shtml. Please note ...

  5. Contested Property Claims

    DEFF Research Database (Denmark)

    Property relations are such a common feature of social life that we can sometimes forget the immense complexity of the web of laws, practices, and ideas that allow a property regime to function smoothly. But we are quickly reminded of this complexity when social conflict over property erupts. When...... social actors confront a property regime – for example by squatting – they enact what can be called ‘contested property claims’. These confrontations raise crucial issues of social justice and show the ways in which property conflicts often reflect wider social conflicts. Through a series of case studies...... from across the globe, this multidisciplinary anthology exploring contested property claims brings together works from anthropologists, legal scholars, and geographers, who show how disagreements give us a privileged window onto how property regimes function and illustrates the many ways...

  6. Contested Property Claims

    DEFF Research Database (Denmark)

    Property relations are such a common feature of social life that the complexity of the web of laws, practices, and ideas that allow a property regime to function smoothly are often forgotten. But we are quickly reminded of this complexity when conflict over property erupts. When social actors...... confront a property regime – for example by squatting – they enact what can be called ‘contested property claims’. As this book demonstrates, these confrontations raise crucial issues of social justice and show the ways in which property conflicts often reflect wider social conflicts. Through a series...... of case studies from across the globe, this multidisciplinary anthology brings together works from anthropologists, legal scholars, and geographers, who show how exploring contested property claims offers a privileged window onto how property regimes function, as well as an illustration of the many ways...

  7. Some core contested concepts.

    Science.gov (United States)

    Chomsky, Noam

    2015-02-01

    Core concepts of language are highly contested. In some cases this is legitimate: real empirical and conceptual issues arise. In other cases, it seems that controversies are based on misunderstanding. A number of crucial cases are reviewed, and an approach to language is outlined that appears to have strong conceptual and empirical motivation, and to lead to conclusions about a number of significant issues that differ from some conventional beliefs.

  8. The 2014 interferometric imaging beauty contest

    Science.gov (United States)

    Monnier, John D.; Berger, Jean-Philippe; Le Bouquin, Jean-Baptiste; Tuthill, Peter G.; Wittkowski, Markus; Grellmann, Rebekka; Müller, André; Renganswany, Sridhar; Hummel, Christian; Hofmann, Karl-Heinz; Schertl, Dieter; Weigelt, Gerd; Young, John; Buscher, David; Sanchez-Bermudez, Joel; Alberdi, Antxon; Schoedel, Rainer; Köhler, Rainer; Soulez, Ferréol; Thiébaut, Éric; Kluska, Jacques; Malbet, Fabien; Duvert, Gilles; Kraus, Stefan; Kloppenborg, Brian K.; Baron, Fabien; de Wit, Willem-Jan; Rivinius, Thomas; Merand, Antoine

    2014-07-01

    Here we present the results of the 6th biennial optical interferometry imaging beauty contest. Taking advantage of a unique opportunity, the red supergiant VY CMa and the Mira variable R Car were observed in the astronomical H-band with three 4-telescope configurations of the VLTI-AT array using the PIONIER instrument. The community was invited to participate in the subsequent image reconstruction and interpretation phases of the project. Ten groups submitted entries to the beauty contest, and we found reasonable consistency between images obtained from independent workers using quite different algorithms. We also found that significant differences existed between the submitted images, much greater than in past beauty contests that were all based on simulated data. A novel crowd-sourcing" method allowed consensus median images to be constructed, filtering likely artifacts and retaining real features." We definitively detect strong spots on the surfaces of both stars as well as distinct circumstellar shells of emission (likely water/CO) around R Car. In a close contest, Joel Sanchez (IAA-CSIC/Spain) was named the winner of the 2014 interferometric imaging beauty contest. This process has shown that new comers" can use publicly-available imaging software to interpret VLTI/PIONIER imaging data, as long as sufficient observations are taken to have complete uv coverage { a luxury that is often missing. We urge proposers to request adequate observing nights to collect sufficient data for imaging and for time allocation committees to recognise the importance of uv coverage for reliable interpretation of interferometric data. We believe that the result of the proposed broad international project will contribute to inspiring trust in the image reconstruction processes in optical interferometry.

  9. Contest ``LET your School GO Into - Space Baptism 2007

    Science.gov (United States)

    Sánchez, G.

    2009-05-01

    The contest ``Space Baptism 2007'' was organized with the cooperation of the Mirador de la Ciencia, a science museum associated with the local zoo in Barquisimeto, Venezuela, and in collaboration with the Asociación Larense de Astronomía, a local astronomy amateur group. This contest was aimed at students of primary schools and had as a final award the chance to give a proper name to an asteroid. The ultimate goal of the contest was to promote basic and space sciences to children and the young through activities that involved the creation of stories related to astronomy, enforcing creativity and originality, and encouraging group work and solidarity. As a result, the asteroid (12758) 1993 SM3 will be known from now on as (12758) Kabudarí. The success of this initiative is demonstrated by stories about the contest that appeared in several publications in local newspapers and magazines about the school and the students who won the contest. We are currently developing plans for repetitions of the contest to name two more asteroids.

  10. Graph transformation tool contest 2008

    NARCIS (Netherlands)

    Rensink, Arend; van Gorp, Pieter

    This special section is the outcome of the graph transformation tool contest organised during the Graph-Based Tools (GraBaTs) 2008 workshop, which took place as a satellite event of the International Conference on Graph Transformation (ICGT) 2008. The contest involved two parts: three “off-line case

  11. Privacy policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, S.; Hartog, den J.I.; Petkovic, M.; Jonker, W.

    2007-01-01

    Privacy is a prime concern in today’s information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes

  12. Privacy Policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy; Petkovic, M.; Jonker, W.; Jonker, Willem

    2007-01-01

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  13. The Impact of Privacy Concerns and Perceived Vulnerability to Risks on Users Privacy Protection Behaviors on SNS: A Structural Equation Model

    OpenAIRE

    Noora Sami Al-Saqer; Mohamed E. Seliaman

    2016-01-01

    This research paper investigates Saudi users’ awareness levels about privacy policies in Social Networking Sites (SNSs), their privacy concerns and their privacy protection measures. For this purpose, a research model that consists of five main constructs namely information privacy concern, awareness level of privacy policies of social networking sites, perceived vulnerability to privacy risks, perceived response efficacy, and privacy protecting behavior was developed. An online survey questi...

  14. Issues and challenges of information fusion in contested environments: panel results

    Science.gov (United States)

    Blasch, Erik; Kadar, Ivan; Chong, Chee; Jones, Eric K.; Tierno, Jorge E.; Fenstermacher, Laurie; Gorman, John D.; Levchuk, Georgiy

    2015-05-01

    With the plethora of information, there are many aspects to contested environments such as the protection of information, network privacy, and restricted observational and entry access. In this paper, we review and contrast the perspectives of challenges and opportunities for future developments in contested environments. The ability to operate in a contested environment would aid societal operations for highly congested areas with limited bandwidth such as transportation, the lack of communication and observations after a natural disaster, or planning for situations in which freedom of movement is restricted. Different perspectives were presented, but common themes included (1) Domain: targets and sensors, (2) network: communications, control, and social networks, and (3) user: human interaction and analytics. The paper serves as a summary and organization of the panel discussion as towards future concerns for research needs in contested environments.

  15. Reward and punishment in a team contest

    NARCIS (Netherlands)

    Heine, F.A.; Strobel, M.

    2015-01-01

    A team contest entails both public good situations within the teams as well as a contest across teams. In an experimental study, we analyse behaviour in such a team contest when allowing to punish or to reward other group members. Moreover, we compare two types of contest environment: One in which

  16. Social Identity and Group Contests

    OpenAIRE

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social identity increases investments in group contests. We show theoretically that increased social identity with the own group implies higher investments in Tullock contests. Empirically we find that induce...

  17. Photowalk contest winners

    CERN Multimedia

    Roberto Cantoni

    2010-01-01

    The local winners of the global particle physics Photowalk have been announced by the five participating laboratories. At CERN, Diego Giol and Christian Stephani were the jury’s favourites, and their photos will now go forward to the global vote, competing against the local winners from DESY in Germany, Fermilab in the US, KEK in Japan and TRIUMF in Canada. Two prizes are to be awarded, one selected by a global jury, the other by popular vote – it’s time to get voting!   Diego Giol #1 The global winners of the Photowalk contest will be revealed by the second week of October, but the local CERN winners were announced last week. After three weeks of work, two meetings of the jury and three successive selections, 20 photos were chosen from the 792 entries. The three highest-ranked will participate in the final competition. The public can vote for their favourite photos on the interactions.org website until 8 October. Only two photographers took the three winning photo...

  18. Genetic privacy.

    Science.gov (United States)

    Sankar, Pamela

    2003-01-01

    During the past 10 years, the number of genetic tests performed more than tripled, and public concern about genetic privacy emerged. The majority of states and the U.S. government have passed regulations protecting genetic information. However, research has shown that concerns about genetic privacy are disproportionate to known instances of information misuse. Beliefs in genetic determinacy explain some of the heightened concern about genetic privacy. Discussion of the debate over genetic testing within families illustrates the most recent response to genetic privacy concerns.

  19. Navy Ship Names: Background for Congress

    Science.gov (United States)

    2016-09-14

    Secretary considers these nominations , along with others he receives as well as his own thoughts in this matter. At appropriate times, he selects names...Research Service 16 “ nomination ” process is often fiercely contested as differing groups make the case that “their” ship name is the most fitting...and practices of the Navy for naming vessels of the Navy, and an explanation for such variances;  Assesses the feasibility and advisability of

  20. Geographic Names

    Data.gov (United States)

    Minnesota Department of Natural Resources — The Geographic Names Information System (GNIS), developed by the United States Geological Survey in cooperation with the U.S. Board of Geographic Names, provides...

  1. Patents, Inducement Prizes, and Contestant Strategy

    DEFF Research Database (Denmark)

    Davis, Jerome; Davis, Lee N.

    2006-01-01

    Debate over the merits of patents versus inducement prizes has tended to ignore the signaling roles of patents, and totally ignores the impact of patent signaling on prize contests. This paper asks: How does patent signaling affect the strategic choices of firms considering entering prize contests......? First, we consider contests that do not allow patenting, then contests that do. If patenting is not allowed, we argue, patent-holders, both internal and external to the contest, can adversely impact prize contests by claiming prize winner violation of their patents, and suing for damages. The likelihood...... of such challenges being made can deter entry, particularly in contests requiring large sunk costs. Furthermore, the firm's decisionmaking process will discriminate against entering prize contests and favor R&D projects with patentable outcomes. Together, these problems may circumscribe any future wider role...

  2. Contest experience and body size affect different types of contest decisions.

    Science.gov (United States)

    Chen, Yu-Ju; Hsu, Yuying

    2016-11-01

    This study examined the relative importance of contest experience and size differences to behavioral decisions over the course of contests. Using a mangrove rivulus fish, Kryptolebias marmoratus, we showed that although contest experience and size differences jointly determined contest outcomes, they affected contestants' interactions at different stages of contests. Contest experience affected behavioral decisions at earlier stages of contests, including the tendency and latency to launch attacks, the tendency to escalate contests into mutual attacks and the outcome of non-escalated contests. Once contests were escalated into mutual attacks, the degree of size difference affected the fish's persistence in escalation and chance of winning, but contest experience did not. These results support the hypothesis that contest experience modifies individuals' estimation of their fighting ability rather than their actual strength. Furthermore, (1) in contests between two naïve contestants, more than 60 % of fish that were 2-3 mm smaller than their opponent escalated the contest to physical fights, even though their larger opponents eventually won 92 % of escalated fights and (2) fish with a losing experience were very likely to retreat in the face of an opponent 2-3 mm smaller than them without escalating. The result that a 2-3 mm size advantage could not offset the influence of a losing experience on the tendency to escalate suggests that, as well as depending on body size, the fish's physical strength is influenced by other factors which require further investigation.

  3. 29 CFR 2200.38 - Employee contests.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Employee contests. 2200.38 Section 2200.38 Labor... Pleadings and Motions § 2200.38 Employee contests. (a) Secretary's statement of reasons. Where an affected employee or authorized employee representative files a notice of contest with respect to the abatement...

  4. Physics Contests for High School Students.

    Science.gov (United States)

    Fox, Doug; Nelson, Jim

    1983-01-01

    Describes how the Ontario Section of the American Association of Physics Teachers started a "Grade Eleven Prize Physics Contest" to generate interest in physics and recognize outstanding students. Also describes outcomes of contests, adaptation of the contest by Southeastern Pennsylvania Section, and suggestions for others wanting to…

  5. Introduction : Global Cultures of Contestation

    NARCIS (Netherlands)

    Peeren, E.; Celikates, R.; de Kloet, J.; Poell, T.; Peeren, E.; Celikates, R.; de Kloet, J.; Poell, T.

    2018-01-01

    From the popular uprisings in North Africa and the Middle East in early 2011, via the Spanish indignados and Occupy Wall Street to the Umbrella movement in Hong Kong, recent years have seen major instances of popular contestation across the world. Moving beyond positions that present a singularly

  6. Financing bidders in takeover contests

    NARCIS (Netherlands)

    Vladimirov, V.

    2012-01-01

    The paper studies a takeover contests, in which cash-constrained bidders decide on the optimal way to finance their cash bid. For both bidders and the seller this decision is at least as important as deciding on whether the payment should be in cash or in securities. The main result is that the

  7. Tales from the dark side: Privacy dark strategies and privacy dark patterns

    DEFF Research Database (Denmark)

    Bösch, Christoph; Erb, Benjamin; Kargl, Frank

    2016-01-01

    Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach. While they support a privacy-aware development process for IT systems, the concepts used by malicious, privacy-threatening parties are generally less understood and known. We argue...... that understanding the “dark side”, namely how personal data is abused, is of equal importance. In this paper, we introduce the concept of privacy dark strategies and privacy dark patterns and present a framework that collects, documents, and analyzes such malicious concepts. In addition, we investigate from...... a psychological perspective why privacy dark strategies are effective. The resulting framework allows for a better understanding of these dark concepts, fosters awareness, and supports the development of countermeasures. We aim to contribute to an easier detection and successive removal of such approaches from...

  8. Bridging the transatlantic divide in privacy

    Directory of Open Access Journals (Sweden)

    Paula Kift

    2013-08-01

    Full Text Available In the context of the US National Security Agency surveillance scandal, the transatlantic privacy divide has come back to the fore. In the United States, the right to privacy is primarily understood as a right to physical privacy, thus the protection from unwarranted government searches and seizures. In Germany on the other hand, it is also understood as a right to spiritual privacy, thus the right of citizens to develop into autonomous moral agents. The following article will discuss the different constitutional assumptions that underlie American and German attitudes towards privacy, namely privacy as an aspect of liberty or as an aspect of dignity. As data flows defy jurisdictional boundaries, however, policymakers across the Atlantic are faced with a conundrum: how can German and American privacy cultures be reconciled?

  9. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  10. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  11. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  12. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  13. HGSA DNA day essay contest winner 60 years on: still coding for cutting-edge science.

    Science.gov (United States)

    Yates, Patrick

    2013-08-01

    MESSAGE FROM THE EDUCATION COMMITTEE: In 2013, the Education Committee of the Human Genetics Society of Australasia (HGSA) established the DNA Day Essay Contest in Australia and New Zealand. The contest was first established by the American Society of Human Genetics in 2005 and the HGSA DNA Day Essay Contest is adapted from this contest via a collaborative partnership. The aim of the contest is to engage high school students with important concepts in genetics through literature research and reflection. As 2013 marks the 60th anniversary of the discovery of the double helix of DNA by James Watson and Francis Crick and the 10th anniversary of the first sequencing of the human genome, the essay topic was to choose either of these breakthroughs and explain its broader impact on biotechnology, human health and disease, or our understanding of basic genetics, such as genetic variation or gene expression. The contest attracted 87 entrants in 2013, with the winning essay authored by Patrick Yates, a Year 12 student from Melbourne High School. Further details about the contest including the names and schools of the other finalists can be found at http://www.hgsa-essay.net.au/. The Education Committee would like to thank all the 2013 applicants and encourage students to enter in 2014.

  14. Analysis of Privacy on Social Networks

    OpenAIRE

    Tomandl, Luboš

    2015-01-01

    This thesis deals with a question of privacy in a context of social networks. The main substance of these services is the users' option to share an information about their lives. This alone can be a problem for privacy. In the first part of this thesis concentrates on the meaning of privacy as well as its value for both individuals and the society. In the next part the privacy threats on social networks, namely Facebook, are discussed. These threats are disclosed on four levels according to f...

  15. Do Privacy Concerns Matter for Millennials?

    DEFF Research Database (Denmark)

    Fodor, Mark; Brem, Alexander

    2015-01-01

    data have raised the question, if location data are considered as sensitive data by users. Thus, we use two privacy concern models, namely Concern for Information Privacy (CFIP) and Internet Users’ Information Privacy Concerns (IUIPC) to find out. Our sample comprises of 235 individuals between 18...... and 34 years (Generation C) from Germany. The results of this study indicate that the second-order factor IUIPC showed better fit for the underlying data than CFIP did. Overall privacy concerns have been found to have an impact on behavioral intentions of users for LBS adoption. Furthermore, other risk...

  16. Preliminary Analysis of Google+'s Privacy

    OpenAIRE

    Mahmood, Shah; Desmedt, Yvo

    2011-01-01

    In this paper we provide a preliminary analysis of Google+ privacy. We identified that Google+ shares photo metadata with users who can access the photograph and discuss its potential impact on privacy. We also identified that Google+ encourages the provision of other names including maiden name, which may help criminals performing identity theft. We show that Facebook lists are a superset of Google+ circles, both functionally and logically, even though Google+ provides a better user interfac...

  17. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  18. 78 FR 44931 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-25

    ...), as amended. This system will provide DLA installations with the ability to rapidly and effectively... Defense Privacy and Civil Liberties Web site at http://dpclo.defense.gov/privacy/SORNs/component/dla/index...: First name, last name, work email, work phone number, mobile phone number, short message service (SMS...

  19. Corporate contestability and corporate expropriation

    Directory of Open Access Journals (Sweden)

    Abdul Hadi Zulkafli

    2016-12-01

    Full Text Available This paper presents evidence on the role of ownership in dealing with corporate expropriation of listed companies in Malaysia. From the perspective of expropriation, a single controlling shareholder is always associated with such behavior due to their power and control at the expense of minority shareholder. However, subsequent individual or coalition of large shareholders can be an important corporate governance tool by providing effective monitoring that would lessen the possibility of expropriation by the controlling shareholder. Relating to that, this study evaluates the role of controlling and large shareholders in dealing with corporate expropriation. It is found that there is a negative relationship between single controlling shareholders and dividend payout ratio indicating that firms with only controlling shareholder will pay a lower dividend due to possible expropriation through profit diversion by controlling shareholder. Using Herfindahl Index as a proxy for ownership contestability, the presence of large shareholders along with controlling shareholder has a positive relationship with dividend payout implying that increased contestability helps to curb the power of controlling shareholder to expropriate fund for their own benefit. In accordance with agency theory, the outcome suggests that large shareholders play a monitoring role in minimizing the Type II agency problem. It is also verifying the argument made based on the Catering Theory of Dividend that the presence of large shareholder brings benefit to all shareholders as they are able to reduce profit diversion by demanding for higher dividend

  20. Observatory Sponsoring Astronomical Image Contest

    Science.gov (United States)

    2005-05-01

    Forget the headphones you saw in the Warner Brothers thriller Contact, as well as the guttural throbs emanating from loudspeakers at the Very Large Array in that 1997 movie. In real life, radio telescopes aren't used for "listening" to anything - just like visible-light telescopes, they are used primarily to make images of astronomical objects. Now, the National Radio Astronomy Observatory (NRAO) wants to encourage astronomers to use radio-telescope data to make truly compelling images, and is offering cash prizes to winners of a new image contest. Radio Galaxy Fornax A Radio Galaxy Fornax A Radio-optical composite image of giant elliptical galaxy NGC 1316, showing the galaxy (center), a smaller companion galaxy being cannibalized by NGC 1316, and the resulting "lobes" (orange) of radio emission caused by jets of particles spewed from the core of the giant galaxy Click on image for more detail and images CREDIT: Fomalont et al., NRAO/AUI/NSF "Astronomy is a very visual science, and our radio telescopes are capable of producing excellent images. We're sponsoring this contest to encourage astronomers to make the extra effort to turn good images into truly spectacular ones," said NRAO Director Fred K.Y. Lo. The contest, offering a grand prize of $1,000, was announced at the American Astronomical Society's meeting in Minneapolis, Minnesota. The image contest is part of a broader NRAO effort to make radio astronomical data and images easily accessible and widely available to scientists, students, teachers, the general public, news media and science-education professionals. That effort includes an expanded image gallery on the observatory's Web site. "We're not only adding new radio-astronomy images to our online gallery, but we're also improving the organization and accessibility of the images," said Mark Adams, head of education and public outreach (EPO) at NRAO. "Our long-term goal is to make the NRAO Image Gallery an international resource for radio astronomy imagery

  1. Learning Reproducibility with a Yearly Networking Contest

    KAUST Repository

    Canini, Marco; Crowcroft, Jon

    2017-01-01

    fostered by organizing a yearly international contest. We argue that holding a contest undertaken by a plurality of students will have benefits that are two-fold. First, it will promote hands-on learning of skills that are helpful in producing artifacts

  2. From Data Privacy to Location Privacy

    Science.gov (United States)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  3. 77 FR 38363 - Office of Privacy, Records, and Disclosure; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-06-27

    ... delinquencies; final determinations of appeals; name/ title of officials responsible for denial of records; and... FOIA and the Privacy Act. Also used to produce statistical reports; and as a data source for management...

  4. Contest in Nanai Shamanic Tales

    Directory of Open Access Journals (Sweden)

    Tatiana Diomidovna Bulgakova

    2015-06-01

    Full Text Available The tale motif of the shamanic tale competition is examined with due regard for the interpretation given by the Nanai storyteller-shamans from the standpoint of their personal spiritual experience. In shamanic practice it is not the personal ability (skill or physical power that provides a challenger victory in conflict, but obtaining spirits-helpers more powerful than those of his or her rival. The predominate role of these fantastic personages/helpers in tales that represent invisible spirit helpers perform real shamanic praxis, explains the loser’s unconditional submission and readiness to sacrifice their freedom or life to the winner. It also clarifies the motivation of the initiators of these contests and games: by means of gathering a great number of competitors, such shamans solve their personal spiritual problems, such as the need to overcome their adversaries or find allies in the struggle against their opponents.

  5. Payoff Shares in Two-Player Contests

    Directory of Open Access Journals (Sweden)

    Samuel Häfner

    2016-09-01

    Full Text Available In imperfectly discriminating contests with symmetric valuations, equilibrium payoffs are positive shares of the value of the prize. In contrast to a bargaining situation, players’ shares sum to less than one because a residual share of the value is lost due to rent dissipation. In this paper, we consider contests with two players and investigate the relationship between these equilibrium shares and the parameters of a class of asymmetric Tullock contest success functions. Our main finding is that any players’ shares that sum up to less than one can arise as the unique outcome of a pure-strategy Nash equilibrium for appropriate parameters.

  6. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  7. CONTESTED IDENTITIES IN MEDIA PORTRAYAL OF MILITANTS ...

    African Journals Online (AJOL)

    MR MATTHEW

    2017-02-02

    Feb 2, 2017 ... been highly contested, along political, social and religious lines. ... This approach to CDA tends to link text analysis of news ... opposition materials allows the militants' view of their identity to be contrasted and compared.

  8. Exploring Women's Understanding of Politics, Political Contestation ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Exploring Women's Understanding of Politics, Political Contestation and Gender ... First, researchers will explore women's political leadership and the extent to ... Sign up now for IDRC news and views sent directly to your inbox each month.

  9. Corporal punishment contestations, paradoxes and implications for ...

    African Journals Online (AJOL)

    Corporal punishment contestations, paradoxes and implications for school leadership: A case study of two South African high schools. ... South African Journal of Education. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current ...

  10. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  11. Rising to the challenge : A model of contest performance

    OpenAIRE

    DesAutels, Philip; Berthon, Pierre; Salehi-Sangari, Esmail

    2011-01-01

    Contests are a ubiquitous form of promotion widely adopted by financial services advertisers, yet, paradoxically, academic research on them is conspicuous in its absence. This work addresses this gap by developing a model of contest engagement and performance. Using motivation theory, factors that drive participant engagement are modeled, and engagement's effect on experience and marketing success of the contest specified. Measures of contest performance, in-contest engagement and post-contes...

  12. Bitcoin Mining as a Contest

    Directory of Open Access Journals (Sweden)

    Nicola Dimitri

    2017-09-01

    Full Text Available This paper presents a simple game theoretic framework, assuming complete information, to model Bitcoin mining activity. It does so by formalizing the activity as an all-pay contest: a competition where participants contend with each other to win a prize by investing in computational power, and victory is probabilistic. With at least two active miners, the unique pure strategy Nash equilibrium of the game suggests the following interesting insights on the motivation for being a miner: while the optimal amount of energy consumption depends also on the reward for solving the puzzle, as long as the reward is positive the decision to be an active miner depends only on the mining costs. Moreover, the intrinsic structure of the mining activity seems to prevent the formation of a monopoly, because in an equilibrium with two miners, both of them will have positive expected profits for any level of the opponent’s costs. A monopoly could only form if the rate of return on investment were higher outside bitcoin.

  13. Interpretation and Analysis of Privacy Policies of Websites in India

    DEFF Research Database (Denmark)

    Dhotre, Prashant Shantaram; Olesen, Henning; Khajuria, Samant

    2016-01-01

    the conditions specified in the policy document. So, ideally the privacy policies should be readable and provide sufficient information to empower users to make knowledgeable decisions. Thus, we have examined more than 50 privacy policies and discussed the content analysis in this paper. We discovered...... on information collection methods, purpose, sharing entities names and data transit. In this study, the 11 % privacy policies are compliance with privacy standards which denotes other privacy policies are less committed to support transparency, choice, and accountability in the process of information collection...... that the policies are not only unstructured but also described in complicated language. Our analysis shows that the user data security measures are nonspecific and unsatisfactory in 57% privacy policies. In spite of huge amount of information collection, the privacy policies does not have clear description...

  14. 76 FR 67155 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-31

    ... inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: The... Federal Register Liaison Officer, Department of Defense. N05000-1 System name: OPNAV Headquarters Web... DEPARTMENT OF DEFENSE Department of the Navy [Docket ID USN-2011-0015] Privacy Act of 1974; System...

  15. 76 FR 52320 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-22

    ... & Privacy, and DoD Information Assurance Regulations. Auditing: Audit trail records from all available.../JS Privacy Office, Freedom of Information Directorate, Washington Headquarters Services, 1155 Defense... Defense. DHA 23 System name: Pharmacy Data Transaction Service (PDTS). System location: Primary: Emdeon...

  16. 78 FR 73511 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-12-06

    ... DEPARTMENT OF DEFENSE [Docket ID: USN-2013-0046] Privacy Act of 1974; System of Records AGENCY... Privacy Act of 1974, as amended. The system being deleted is N01500-8, System Name: Personnel and Training... Internet at http://www.regulations.gov as they are received without change, including any personal...

  17. Morgellons: contested illness, diagnostic compromise and medicalisation.

    Science.gov (United States)

    Fair, Brian

    2010-05-01

    The case of Morgellons illustrates how the emergence of a new medically contested illness intersected with and impacted on the diagnostic processes of an existing uncontested psychiatric condition, Delusional Parasitosis (DP). More specifically, the sociopolitical processes at play in the contested illness, Morgellons, dubiously reflect patient empowerment, as well the resilience and power of medical jurisdiction. This research offers insights into the contested illness and medicalisation literatures, and aims to bridge these two approaches towards the relationship between patient empowerment and medical authority, which I do through the notion of doctor-patient compromise. The data for this research come from a comprehensive qualitative analysis of Morgellons discourse through four key sources: the pro-Morgellons website Morgellons.org; the anti-Morgellons website Morgellonswatch.com; the popular media's portrayal of Morgellons; and the DP and Morgellons articles published in peer-reviewed medical journals, as made available on PubMed.

  18. Is Electronic Privacy Achievable?

    National Research Council Canada - National Science Library

    Irvine, Cynthia E; Levin, Timothy E

    2000-01-01

    ... individuals. The purpose of this panel was to focus on how new technologies are affecting privacy. Technologies that might adversely affect privacy were identified by Rein Turn at previous symposia...

  19. Privacy and Innovation

    OpenAIRE

    Avi Goldfarb; Catherine Tucker

    2011-01-01

    Information and communication technology now enables firms to collect detailed and potentially intrusive data about their customers both easily and cheaply. This means that privacy concerns are no longer limited to government surveillance and public figures' private lives. The empirical literature on privacy regulation shows that privacy regulation may affect the extent and direction of data-based innovation. We also show that the impact of privacy regulation can be extremely heterogeneous. T...

  20. Neuroethics and Brain Privacy

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2017-01-01

    An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology.......An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology....

  1. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  2. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  3. Blue Marble Space Institute essay contest

    Science.gov (United States)

    Wendel, JoAnna

    2014-04-01

    The Blue Marble Space Institute of Science, based in Seattle, Wash., is inviting college students to participate in its essay contest. Essays need to address the question, "In the next 100 years, how can human civilization prepare for the long-term changes to the Earth system that will occur over the coming millennium?" According to the institute, the purpose of the contest is "to stimulate creative thinking relating to space exploration and global issues by exploring how changes in the Earth system will affect humanity's future."

  4. Learning Reproducibility with a Yearly Networking Contest

    KAUST Repository

    Canini, Marco

    2017-08-10

    Better reproducibility of networking research results is currently a major goal that the academic community is striving towards. This position paper makes the case that improving the extent and pervasiveness of reproducible research can be greatly fostered by organizing a yearly international contest. We argue that holding a contest undertaken by a plurality of students will have benefits that are two-fold. First, it will promote hands-on learning of skills that are helpful in producing artifacts at the replicable-research level. Second, it will advance the best practices regarding environments, testbeds, and tools that will aid the tasks of reproducibility evaluation committees by and large.

  5. Holiday Door Decorating Contest Brings Cheer | Poster

    Science.gov (United States)

    By Carolynne Keenan, Contributing Writer Other than the time of year, what do the following have in common: the leg lamp from the movie “A Christmas Story,” a compilation of silly holiday jokes, a gingerbread house, and Santa on a motorcycle? All four were among the individual door winners for the Holiday Door Decorating Contest, held at NCI at Frederick in December. Employees dressed up their office doors, hallways, and even stairwells to participate. Entries for the contest included individual office doors as well as groups. Some employees even “decked the halls” of whole office buildings to participate.

  6. Contestation of citizenship ’from below’

    DEFF Research Database (Denmark)

    Brändle, Verena Katharina

    -up’ approach to citizenship contestation according to people’s views of their relationship with political authorities as well as concerning questions of how to organise just social interaction among each other. Here, the thesis argues that online media allow people to constitute themselves as political...... citizenship, the thesis conducts an inductive comments analysis and compares them across German and Danish online news sites. Regarding EU mobiles’ citizenship contestation, it draws from two online surveys distributed in Facebook groups and analyses and compares semi-structured interviews with EU mobiles...

  7. 76 FR 53421 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-26

    ..., Air Force Privacy Act Office, Office of Warfighting Integration and Chief Information Officer, ATTN...: Name, signatures, personal contact information, individual's employer and institutional, organizational..., Historical Products, Services, and Requirements; Air Force Instruction 84-105, Organizational Lineage, Honors...

  8. Privacy and Library Records

    Science.gov (United States)

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  9. Privacy Verification Using Ontologies

    NARCIS (Netherlands)

    Kost, Martin; Freytag, Johann-Christoph; Kargl, Frank; Kung, Antonio

    2011-01-01

    As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a

  10. What's in a name?

    DEFF Research Database (Denmark)

    Silverberg, J. I.; Thyssen, J. P.; Paller, A. S.

    2017-01-01

    Background: The ideal nomenclature of atopic dermatitis (AD) / atopic eczema (AE) has long been contested. However, it is becoming increasinglSy clear that the disparate nomenclature of this disease may have important deleterious ramifications for clinical care and research. Materials and Methods...

  11. Hybrid All-Pay and Winner-Pay Contests

    DEFF Research Database (Denmark)

    Lagerlöf, Johan

    2017-01-01

    In many contests in economic and political life, both all-pay and winner-pay expenditures matter for winning. This paper studies such hybrid contests under symmetry and asymmetry. The symmetric model is very general but still yields a simple closed-form solution. More contestants tend to lead to ...... expenditures. An endogenous bias that maximizes total expenditures disfavors the high-valuation contestant but still makes her the more likely one to win....

  12. The National Solo and Ensemble Contest 1929-1937

    Science.gov (United States)

    Meyers, Brian D.

    2012-01-01

    This study is the first investigation of the nine-year history of the National Solo and Ensemble Contests, held in the United States in conjunction with the National School Band and Orchestra Contests of the late 1920s and early to mid-1930s. Primary sources used include letters from those involved with the planning of the contests, meeting…

  13. Bribing potential entrants in a rent-seeking contest

    NARCIS (Netherlands)

    Schoonbeek, L.

    We consider a two-stage model of a Tullock rent-seeking contest where one new potential entrant makes his appearance. In the first stage each other player can contribute to bribe this new player to commit not to enter the contest. In the second stage we have the actual contest either with or without

  14. Contending with contest in academic literacy. | Murray ...

    African Journals Online (AJOL)

    Stellenbosch Papers in Linguistics Plus. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 29 (1996) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Contending with contest in academic literacy. H Murray ...

  15. Contests with rank-order spillovers

    NARCIS (Netherlands)

    M.R. Baye (Michael); D. Kovenock (Dan); C.G. de Vries (Casper)

    2012-01-01

    textabstractThis paper presents a unified framework for characterizing symmetric equilibrium in simultaneous move, two-player, rank-order contests with complete information, in which each player's strategy generates direct or indirect affine "spillover" effects that depend on the rank-order of her

  16. Robots in Action - Professional Contest 2017

    Directory of Open Access Journals (Sweden)

    Paul Ciprian Patic

    2017-06-01

    Full Text Available The Robotics Society of Romania, Targoviste subsidiary, together with the Electrical Engineering, Electronics and Information Technology Faculty, "Valahia" University of Targoviste, held on May 30th 2017, starting from 11.00h, in the Rotonda of Engineering Faculties, the tenth edition of the professional students contest "ROBOTS IN ACTION".

  17. Robots in Action - Professional Contest 2016

    Directory of Open Access Journals (Sweden)

    Paul Ciprian Patic

    2016-06-01

    Full Text Available The organizers of the 9th edition of the Professional Contest "ROBOTS IN ACTION" were, as usual, the Electrical Engineering, Electronics and Information Technology Faculty, "Valahia" University of Targoviste, together with the Robotics Society of Romania, Targoviste subsidiary and the Students League.

  18. Exploring Women's Understanding of Politics, Political Contestation ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Exploring Women's Understanding of Politics, Political Contestation and Gender Transformation in the Caribbean. IDRC's Democratic Governance, Women's Rights and Gender Equality initiative is supporting a body of comparative research on whether and how democratic processes and institutions are responding to ...

  19. Jackpot for Insurgent in Louisiana Contest

    Science.gov (United States)

    Cavanagh, Sean

    2012-01-01

    Campaigns for state school board are typically quiet affairs, eliciting only modest interest from the public and even less from political donors. But the race last fall for the District 2 seat on Louisiana's board of elementary and secondary education was a remarkable exception. The contest attracted the attention of education activists and…

  20. Designing Successful Science Contests for K-12

    Science.gov (United States)

    Schwerin, T.; Colleton, N.

    2006-12-01

    Contests can engage, motivate, instruct and inspire students of all grade levels and interests. What are the ingredients necessary for a successful science contest? The Institute for Global Environmental Strategies (IGES) has recommendations for designing science-based competitions that are both fun and educational for for elementary and secondary students. These recommendations were developed as a result of IGES' experience gained through two annual student competitions that focus on Earth science topics: An annual art contest, for grades 2-4, challenges U.S. students to explore a specific Earth science topic. For example, past themes have included Polar Explorations: Going to Extremes (2006); Connect-4: Air, Land, Water, and Life (2005); and Picture Me: What Kind of Earth Explorer Would I Be? (2004). The contest supports national science education standards for grades K-4, and includes suggested classroom activities, books, and movies. The Thacher Scholarship was founded in 2000 by IGES in honor of the late Peter S. Thacher, a former IGES board member and leader in promoting the use of satellite remote sensing. The $4,000 scholarship is awarded to exceptional high school students displaying the best use of satellite remote sensing in understanding our changing planet.

  1. Contested claims to gardens and land

    DEFF Research Database (Denmark)

    Obika, Julaina; Adol, Ben Otto; Babiiha, Sulayman Mpisi

    2018-01-01

    This chapter explores how, in a patrilineal and patriarchal society recovering from two decades of war, women and men frame arguments about entitlement. Here claims to gardens (plots of land for cultivation) become a contested conversation about women’s rights of belonging to family and community...

  2. Contests versus Norms: Implications of Contest-Based and Norm-Based Intervention Techniques.

    Science.gov (United States)

    Bergquist, Magnus; Nilsson, Andreas; Hansla, André

    2017-01-01

    Interventions using either contests or norms can promote environmental behavioral change. Yet research on the implications of contest-based and norm-based interventions is lacking. Based on Goal-framing theory, we suggest that a contest-based intervention frames a gain goal promoting intensive but instrumental behavioral engagement. In contrast, the norm-based intervention was expected to frame a normative goal activating normative obligations for targeted and non-targeted behavior and motivation to engage in pro-environmental behaviors in the future. In two studies participants ( n = 347) were randomly assigned to either a contest- or a norm-based intervention technique. Participants in the contest showed more intensive engagement in both studies. Participants in the norm-based intervention tended to report higher intentions for future energy conservation (Study 1) and higher personal norms for non-targeted pro-environmental behaviors (Study 2). These findings suggest that contest-based intervention technique frames a gain goal, while norm-based intervention frames a normative goal.

  3. Contests versus Norms: Implications of Contest-Based and Norm-Based Intervention Techniques

    Directory of Open Access Journals (Sweden)

    Magnus Bergquist

    2017-11-01

    Full Text Available Interventions using either contests or norms can promote environmental behavioral change. Yet research on the implications of contest-based and norm-based interventions is lacking. Based on Goal-framing theory, we suggest that a contest-based intervention frames a gain goal promoting intensive but instrumental behavioral engagement. In contrast, the norm-based intervention was expected to frame a normative goal activating normative obligations for targeted and non-targeted behavior and motivation to engage in pro-environmental behaviors in the future. In two studies participants (n = 347 were randomly assigned to either a contest- or a norm-based intervention technique. Participants in the contest showed more intensive engagement in both studies. Participants in the norm-based intervention tended to report higher intentions for future energy conservation (Study 1 and higher personal norms for non-targeted pro-environmental behaviors (Study 2. These findings suggest that contest-based intervention technique frames a gain goal, while norm-based intervention frames a normative goal.

  4. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  5. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... FEDERAL RESERVE SYSTEM 12 CFR Part 261a [Docket No. R-1313] Privacy Act of 1974; Privacy Act... implementing the Privacy Act of 1974 (Privacy Act). The primary changes concern the waiver of copying fees... records under the Privacy Act; the amendment of special procedures for the release of medical records to...

  6. A Taxonomy of Privacy Constructs for Privacy-Sensitive Robotics

    OpenAIRE

    Rueben, Matthew; Grimm, Cindy M.; Bernieri, Frank J.; Smart, William D.

    2017-01-01

    The introduction of robots into our society will also introduce new concerns about personal privacy. In order to study these concerns, we must do human-subject experiments that involve measuring privacy-relevant constructs. This paper presents a taxonomy of privacy constructs based on a review of the privacy literature. Future work in operationalizing privacy constructs for HRI studies is also discussed.

  7. 75 FR 56079 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-09-15

    .... Bryman, Alternate OSD Federal Register Liaison Officer, Department of Defense. GNSA 24 System name: NSA..., Classified National Security Information; and NSA/CSS Policy 1-30, Review of NSA/CSS Information for Public... entry and replace with ``The NSA/CSS rules for contesting contents and appealing initial determinations...

  8. Designing Privacy for You : A User Centric Approach For Privacy

    OpenAIRE

    Senarath, Awanthika; Arachchilage, Nalin A. G.; Slay, Jill

    2017-01-01

    Privacy directly concerns the user as the data owner (data- subject) and hence privacy in systems should be implemented in a manner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy and embedding privacy into systems. However, none of them approaches privacy in a user- centered manner. Through this research we propose a framework that would enable developers and designers to grasp privacy in a user-centered manner and implement...

  9. Constructing and Contesting City of London Power

    DEFF Research Database (Denmark)

    Baker, Andrew; Wigan, Duncan

    2017-01-01

    Existing literature on the City of London has tended to focus on its ‘structural power’, while neglecting political and narrative agency. This paper acts as a corrective by presenting evidence to show that since the financial crash of 2008 the political terrain the City operates on has become more...... contested, crowded and noisier. The contribution develops a middle course between a positive assessment of the role of civil society in relation to global finance, and a more pessimistic reading. We demonstrate how macro-narratives and public story-telling both construct and contest City and financial...... sector power. In a new pattern since the financial crash, NGOs have moved from campaigns of limited duration and narrow focus, to a more sustained presence on macro-structural issues. Adopting a supply–demand framework for assessing governance and regulatory change, we look at the emergence of TheCity...

  10. Regulating Online Data Privacy

    OpenAIRE

    Paul Reid

    2004-01-01

    With existing data protection laws proving inadequate in the fight to protect online data privacy and with the offline law of privacy in a state of change and uncertainty, the search for an alternative solution to the important problem of online data privacy should commence. With the inherent problem of jurisdiction that the Internet presents, such a solution is best coming from a multi-national body with the power to approximate laws in as many jurisdictions as possible, with a recognised au...

  11. Protecting genetic privacy.

    Science.gov (United States)

    Roche, P A; Annas, G J

    2001-05-01

    This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.

  12. Robots in Action - Proffesional Contest 2014

    Directory of Open Access Journals (Sweden)

    Paul Ciprian Patic

    2014-06-01

    Full Text Available The Electrical Engineering, Electronics and Information Technology Faculty, "Valahia" University of Targoviste, together with the Robotics Society of Romania, Targoviste subsidiary and the Students League, held the 7th edition of the Professional Contest "ROBOTS IN ACTION" on June 5th 2014, starting from 12.00h, in the Faculty hall. Students and teams of students participated, exposing 10 practical applications in the fields of robotics and mechatronics.

  13. Case study: Natural bodybuilding contest preparation.

    Science.gov (United States)

    Kistler, Brandon M; Fitschen, Peter J; Ranadive, Sushant M; Fernhall, Bo; Wilund, Kenneth R

    2014-12-01

    The purpose of this study was to document the physiological changes that occur in a natural bodybuilder during prolonged contest preparation for a proqualifying contest. During the 26-week preparation, the athlete undertook a calorically restrictive diet with 2 days of elevated carbohydrate intake per week, increased cardiovascular (CV) training, and attempted to maintain resistance-training load. The athlete was weighed twice a week and body composition was measured monthly by DXA. At baseline and every 2 weeks following CV structure and function was measured using a combination of ultrasound, applanation tonometry, and heart rate variability (HRV). Cardiorespiratory performance was measured by VO(2)peak at baseline, 13 weeks, and 26 weeks. Body weight (88.6 to 73.3 Kg, R(2) = .99) and percent body fat (17.5 to 7.4%) were reduced during preparation. CV measurements including blood pressure (128/61 to 113/54 mmHg), brachial pulse wave velocity (7.9 to 5.8m/s), and measures of wave reflection all improved. Indexed cardiac output was reduced (2.5 to 1.8L/m(2)) primarily due to a reduction in resting heart rate (71 to 44 bpm), and despite an increase in ejection faction (57.9 to 63.9%). Assessment of HRV found a shift in the ratio of low to high frequency (209.2 to 30.9%). Absolute VO2 was minimally reduced despite weight loss resulting in an increase in relative VO2 (41.9 to 47.7 ml/Kg). In general, this prolonged contest preparation technique helped the athlete to improve body composition and resulted in positive CV changes, suggesting that this method of contest preparation appears to be effective in natural male bodybuilders.

  14. The three names

    NARCIS (Netherlands)

    Bas Jongenelen

    2011-01-01

    Two spectators are each asked to think of a girl's name (because your sister in law is pregnant and names are a big issue at the moment in your family.) You explain that you have a boy's name in your head, and you ask the spectators to think what this boy's name might be. You write three names on a

  15. Privacy in domestic environments

    OpenAIRE

    Radics, Peter J; Gracanin, Denis

    2011-01-01

    non-peer-reviewed While there is a growing body of research on privacy,most of the work puts the focus on information privacy. Physical and psychological privacy issues receive little to no attention. However, the introduction of technology into our lives can cause problems with regard to these aspects of privacy. This is especially true when it comes to our homes, both as nodes of our social life and places for relaxation. This paper presents the results of a study intended to captu...

  16. Privacy Training Program

    Science.gov (United States)

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  17. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  18. Privacy and security in the digital age: Contemporary ethical challenges and future directions

    DEFF Research Database (Denmark)

    Hiranandani, Vanmala Sunder

    2011-01-01

    Privacy is at the core of civil rights from which all other human rights and freedoms flow. Since the twentieth century, and particularly since 9/11, rapid deployment of information and surveillance technologies in the name of national security has grave implications for individual privacy...... and human rights. This article reviews major strands in contemporary privacy-security debate, while critiquing existing conceptualisations of privacy that are inadequate in the context of multifaceted and ubiquitous surveillance technologies post 9/11. Further, this paper contends most privacy...

  19. Privacy enhanced recommender system

    NARCIS (Netherlands)

    Erkin, Zekeriya; Erkin, Zekeriya; Beye, Michael; Veugen, Thijs; Lagendijk, Reginald L.

    2010-01-01

    Recommender systems are widely used in online applications since they enable personalized service to the users. The underlying collaborative filtering techniques work on user’s data which are mostly privacy sensitive and can be misused by the service provider. To protect the privacy of the users, we

  20. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  1. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for

  2. Privacy under construction : A developmental perspective on privacy perception

    NARCIS (Netherlands)

    Steijn, W.M.P.; Vedder, A.H.

    2015-01-01

    We present a developmental perspective regarding the difference in perceptions toward privacy between young and old. Here, we introduce the notion of privacy conceptions, that is, the specific ideas that individuals have regarding what privacy actually is. The differences in privacy concerns often

  3. What's in a Name

    Science.gov (United States)

    Bush, Sarah B.; Albanese, Judith; Karp, Karen S.

    2016-01-01

    Historically, some baby names have been more popular during a specific time span, whereas other names are considered timeless. The Internet article, "How to Tell Someone's Age When All You Know Is Her Name" (Silver and McCann 2014), describes the phenomenon of the rise and fall of name popularity, which served as a catalyst for the…

  4. British Sign Name Customs

    Science.gov (United States)

    Day, Linda; Sutton-Spence, Rachel

    2010-01-01

    Research presented here describes the sign names and the customs of name allocation within the British Deaf community. While some aspects of British Sign Language sign names and British Deaf naming customs differ from those in most Western societies, there are many similarities. There are also similarities with other societies outside the more…

  5. Psychology: red enhances human performance in contests.

    Science.gov (United States)

    Hill, Russell A; Barton, Robert A

    2005-05-19

    Red coloration is a sexually selected, testosterone-dependent signal of male quality in a variety of animals, and in some non-human species a male's dominance can be experimentally increased by attaching artificial red stimuli. Here we show that a similar effect can influence the outcome of physical contests in humans--across a range of sports, we find that wearing red is consistently associated with a higher probability of winning. These results indicate not only that sexual selection may have influenced the evolution of human response to colours, but also that the colour of sportswear needs to be taken into account to ensure a level playing field in sport.

  6. Distribution of Chinese names

    Science.gov (United States)

    Huang, Ding-wei

    2013-03-01

    We present a statistical model for the distribution of Chinese names. Both family names and given names are studied on the same basis. With naive expectation, the distribution of family names can be very different from that of given names. One is affected mostly by genealogy, while the other can be dominated by cultural effects. However, we find that both distributions can be well described by the same model. Various scaling behaviors can be understood as a result of stochastic processes. The exponents of different power-law distributions are controlled by a single parameter. We also comment on the significance of full-name repetition in Chinese population.

  7. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  8. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  9. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  10. The Cultural Ideological Contestation in National Examination

    Directory of Open Access Journals (Sweden)

    Kerta Adhi Made

    2018-01-01

    Full Text Available The purpose of this research was to find out the forms and the factors leading to the contestation of cultural ideology in National Examination. This research utilized Qualitative Research method and the approach of Cultural Studies. Based on the analysis, it was found that the forms of ideological contestation, specifically, centralistic, prioritizing on the result of cognitive domain, and imaging. The factors which caused consisted of political of education, state policies, and socio-cultural. The implications of this research were (1 There was shifting of educational values into capitalism, (2 The meaning of learning became limited in which it was just purposed at facing National Examination, (3 Educational services have shifted from humanist public services to commodification of education, with the result that honesty was marginalized. Eventhough the government has developed sophisticated system and very tight supervision, if the character of the subjects are not formed and cultured, accordingly, the National Examination stated honest and achievement oriented will be just a slogan. Therefore, the education system needs to be improved. The education paradigm which is more emphasized on the increasing of intellectual intelligence by multiple choice tests and scores needs to be deconstructed by adjusting with Indonesian cultural values based on “Pancasila” as ideological foundation and developing character education to the children from early age.

  11. Contested Boundaries: psychiatry, disease, and diagnosis.

    Science.gov (United States)

    Rosenberg, Charles E

    2015-01-01

    Since the 19th century, we have come to think of disease in terms of specific entities--entities defined and legitimated in terms of characteristic somatic mechanisms. Since the last third of that century, we have expanded would-be disease categories to include an ever-broader variety of emotional pain, idiosyncrasy, and culturally unsettling behaviors. Psychiatry has been the residuary legatee of these developments, developments that have always been contested at the ever-shifting boundary between disease and deviance, feeling and symptom, the random and the determined, the stigmatized and the value-free. Even in our era of reductionist hopes, psychopharmaceutical practice, and corporate strategies, the legitimacy of many putative disease categories will remain contested. The use of the specific disease entity model will always be a reductionist means to achieve necessarily holistic ends, both in terms of cultural norms and the needs of suffering individuals. Bureaucratic rigidities and stakeholder conflicts structure and intensify such boundary conflicts, as do the interests and activism of an interested lay public.

  12. Marine Place Names

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains the geographic place names for features in the U.S territorial waters and outer continental shelf. These names can be used to find or define a...

  13. Self-sacrifice in 'desperado' contests between relatives

    Directory of Open Access Journals (Sweden)

    Monnin Thibaud

    2010-10-01

    Full Text Available Abstract Intra-specific competition occurs in all animal species and can lead to escalated conflict. Overt fighting entails the risk of injury or death, and is usually avoided through the use of conventions or pre-fight assessments. However, overt fighting can be expected when value of the contest outweighs the value of the future, as contestants have little or nothing to lose. In these situations, respect for conventions and asymmetries between contestants can break down, and overt fighting becomes more likely (the desperado effect. Such conditions can arise in contests between queens over colony ownership in social insects, because the value of inheriting a colony of potentially thousands of helpers is huge and queens may have very limited alternative reproductive options. However, in social species the balance of possible outcomes may be influenced by inclusive fitness, as contestants are often relatives. Here we present a simple model based on social insects, which demonstrates that not fighting can be selectively advantageous when there is a risk posed by fighting to inclusive fitness, even when not fighting is likely to result in death. If contestants are related, a loser can still gain indirect fitness through the winner, whereas fighting introduces a risk that both queens will die and thereby obtain zero inclusive fitness. When relatedness is high and fighting poses a risk of all contestants dying, it can be advantageous to cede the contest and be killed, rather than risk everything by fighting.

  14. 27 CFR 10.24 - Sales promotion contests.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Sales promotion contests. 10.24 Section 10.24 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS COMMERCIAL BRIBERY Commercial Bribery § 10.24 Sales promotion contests...

  15. Reversing the AAPT Photo Contest: A Physics Teacher Education Activity

    Science.gov (United States)

    Hechter, Richard P.

    2016-01-01

    This year while awaiting the arrival of the AAPT High School Physics Photo Contest poster, I developed an idea for my physics teacher education course that used the photo contest in a new context. While using an external source like a photograph to learn physics is not new to physics education, this article describes how we used the foundational…

  16. The Effect of Peer Pressure on Performance in Crowdsourcing Contests

    DEFF Research Database (Denmark)

    Heite, Jonas; Hoisl, Karin

    We investigate whether and why performance differences exist between contestants with the same abilities but who compete against more skilled or less skilled contestants. We analyze 1,677 unique coders competing in 38 software algorithm competitions with random assignment. Part of these coders co...

  17. A Contest-Oriented Project for Learning Intelligent Mobile Robots

    Science.gov (United States)

    Huang, Hsin-Hsiung; Su, Juing-Huei; Lee, Chyi-Shyong

    2013-01-01

    A contest-oriented project for undergraduate students to learn implementation skills and theories related to intelligent mobile robots is presented in this paper. The project, related to Micromouse, Robotrace (Robotrace is the title of Taiwanese and Japanese robot races), and line-maze contests was developed by the embedded control system research…

  18. Naming as Strategic Communication

    DEFF Research Database (Denmark)

    Schmeltz, Line; Kjeldsen, Anna Karina

    2016-01-01

    This article presents a framework for understanding corporate name change as strategic communication. From a corporate branding perspective, the choice of a new name can be seen as a wish to stand out from a group of similar organizations. Conversely, from an institutional perspective, name change...

  19. Will You Accept the Government's Friend Request? Social Networks and Privacy Concerns

    OpenAIRE

    Siegel, David A.

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to con...

  20. National Privacy Research Strategy

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — On July 1, NITRD released the National Privacy Research Strategy. Research agencies across government participated in the development of the strategy, reviewing...

  1. Cybersecurity and Privacy

    DEFF Research Database (Denmark)

    he huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at the company and at individual level. Cybersecurity and Privacy – bridging the gap addresses...... two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others....... Policies, frameworks, strategies, laws, tools, techniques, and technologies – all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject...

  2. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  3. Certificate Transparency with Privacy

    Directory of Open Access Journals (Sweden)

    Eskandarian Saba

    2017-10-01

    Full Text Available Certificate transparency (CT is an elegant mechanism designed to detect when a certificate authority (CA has issued a certificate incorrectly. Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues. First, we develop a mechanism that enables web browsers to audit a CT log without violating user privacy. Second, we extend CT to support non-public subdomains.

  4. Using contests to allocate pollution rights

    International Nuclear Information System (INIS)

    MacKenzie, Ian A.; Hanley, Nick; Kornienko, Tatiana

    2009-01-01

    In this paper we advocate a new initial allocation mechanism for a tradable pollution permit market. We outline a Permit Allocation Contest (PAC) that distributes permits to firms based on their rank relative to other firms. This ranking is achieved by ordering firms based on an observable 'external action' where the external action is an activity or characteristic of the firm that is independent of their choice of emissions in the tradable permit market. We argue that this mechanism has a number of benefits over auctioning and grandfathering. Using this mechanism efficiently distributes permits, allows for the attainment of a secondary policy objective and has the potential to be more politically appealing than existing alternatives.

  5. The Indian IVF saga: a contested history

    Directory of Open Access Journals (Sweden)

    Aditya Bharadwaj

    2016-06-01

    Full Text Available The politics of conception in India can be traced back to the birth of the world’s first test-tube baby in 1978. This article focuses on an incident where scientists and clinicians were involved in a heated contest over ascription of intellectual credit for the birth of the first test-tube baby in India. It traces the controversy surrounding claims and counter-claims within the medical domain that appear to have emerged as a corollary to the rapid expansion of assisted conception in India. The article emphasizes the fact that this contentious issue played out largely in the media and shows that the generation of scientific credibility and reward is produced and ascribed both inside and outside the scientific domain. In so doing the article offers a glimpse into the unique ability of cultural activity to shape and recast the perception of science and scientific outcomes.

  6. One Size Doesn’t Fit All: Measuring Individual Privacy in Aggregate Genomic Data

    Science.gov (United States)

    Simmons, Sean; Berger, Bonnie

    2017-01-01

    Even in the aggregate, genomic data can reveal sensitive information about individuals. We present a new model-based measure, PrivMAF, that provides provable privacy guarantees for aggregate data (namely minor allele frequencies) obtained from genomic studies. Unlike many previous measures that have been designed to measure the total privacy lost by all participants in a study, PrivMAF gives an individual privacy measure for each participant in the study, not just an average measure. These individual measures can then be combined to measure the worst case privacy loss in the study. Our measure also allows us to quantify the privacy gains achieved by perturbing the data, either by adding noise or binning. Our findings demonstrate that both perturbation approaches offer significant privacy gains. Moreover, we see that these privacy gains can be achieved while minimizing perturbation (and thus maximizing the utility) relative to stricter notions of privacy, such as differential privacy. We test PrivMAF using genotype data from the Wellcome Trust Case Control Consortium, providing a more nuanced understanding of the privacy risks involved in an actual genome-wide association studies. Interestingly, our analysis demonstrates that the privacy implications of releasing MAFs from a study can differ greatly from individual to individual. An implementation of our method is available at http://privmaf.csail.mit.edu. PMID:29202050

  7. 78 FR 43258 - Privacy Act; System of Records: Human Resources Records, State-31

    Science.gov (United States)

    2013-07-19

    ... DEPARTMENT OF STATE [Public Notice 8384] Privacy Act; System of Records: Human Resources Records... system of records, Human Resources Records, State- 31, pursuant to the provisions of the Privacy Act of... State proposes that the current system will retain the name ``Human Resources Records'' (previously...

  8. The role of male contest competition over mates in speciation

    Directory of Open Access Journals (Sweden)

    Anna QVARNSTRÖM, Niclas VALLIN, Andreas RUDH

    2012-06-01

    Full Text Available Research on the role of sexual selection in the speciation process largely focuses on the diversifying role of mate choice. In particular, much attention has been drawn to the fact that population divergence in mate choice and in the male traits subject to choice directly can lead to assortative mating. However, male contest competition over mates also constitutes an important mechanism of sexual selection. We review recent empirical studies and argue that sexual selection through male contest competition can affect speciation in ways other than mate choice. For example, biases in aggression towards similar competitors can lead to disruptive and negative frequency-dependent selection on the traits used in contest competition in a similar way as competition for other types of limited resources. Moreover, male contest abilities often trade-off against other abilities such as parasite resistance, protection against predators and general stress tolerance. Populations experiencing different ecological conditions should therefore quickly diverge non-randomly in a number of traits including male contest abilities. In resource based breeding systems, a feedback loop between competitive ability and habitat use may lead to further population divergence. We discuss how population divergence in traits used in male contest competition can lead to the build up of reproductive isolation through a number of different pathways. Our main conclusion is that the role of male contest competition in speciation remains largely scientifically unexplored [Current Zoology 58 (3: 490–506, 2012].

  9. An informational theory of privacy

    NARCIS (Netherlands)

    Schottmuller, C.; Jann, Ole

    2016-01-01

    We develop a theory that explains how and when privacy can increase welfare. Without privacy, some individuals misrepresent their preferences, because they will otherwise be statistically discriminated against. This "chilling effect" hurts them individually, and impairs information aggregation. The

  10. The Name Game.

    Science.gov (United States)

    Crawley, Sharon J.

    Described is a game which provides a method for teaching students to locate cities and towns on a map. Students are provided with a list of descriptive phrases which stand for the name of a city, e.g., hot weather town (Summerville, Georgia); a chocolate candy bar (Hershey, Pennsylvania). Using a map, students must then try to find the name of a…

  11. Directory of awardee names

    Energy Technology Data Exchange (ETDEWEB)

    1999-07-01

    Standardization of grant and contract awardee names has been an area of concern since the development of the Department`s Procurement and Assistance Data System (PADS). A joint effort was begun in 1983 by the Office of Scientific and Technical Information (OSTI) and the Office of Procurement and Assistance Management/Information Systems and Analysis Division to develop a means for providing uniformity of awardee names. As a result of this effort, a method of assigning vendor identification codes to each unique awardee name, division, city, and state combination was developed and is maintained by OSTI. Changes to vendor identification codes or awardee names contained in PADS can be made only by OSTI. Awardee names in the Directory indicate that the awardee has had a prime contract (excluding purchase orders of $10,000 or less) with, or a financial assistance award from, the Department. Award status--active, inactive, or retired--is not shown. The Directory is in alphabetic sequence based on awardee name and reflects the OSTI-assigned vendor identification code to the right of the name. A vendor identification code is assigned to each unique awardee name, division, city, and state (for place of performance). The same vendor identification code is used for awards throughout the Department.

  12. 29 CFR 2700.21 - Effect of filing notice of contest of citation or order.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Effect of filing notice of contest of citation or order... REVIEW COMMISSION PROCEDURAL RULES Contests of Citations and Orders § 2700.21 Effect of filing notice of contest of citation or order. (a) The filing of a notice of contest of a citation or order issued under...

  13. Privacy in social networking sites

    OpenAIRE

    Λεονάρδος, Γεώργιος; Leonardos, Giorgos

    2016-01-01

    The purpose of this study is to explore the aspects of privacy over the use of social networks web sites. More specific, we will show the types of social networks, their privacy mechanisms that are different in each social network site, their privacy options that are offered to users. We will report some serious privacy violations incidents of the most popular social networks sites such as Facebook, Twitter, LinkedIn. Also, we will report some important surveys about social networks and pr...

  14. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Science.gov (United States)

    2012-05-25

    ... presentations, including the privacy compliance fundamentals, privacy and data security, and the privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Privacy Compliance... Homeland Security Privacy Office will host a public workshop, ``Privacy Compliance Workshop.'' DATES: The...

  15. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  16. Privacy in an Ambient World

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  17. 76 FR 59073 - Privacy Act

    Science.gov (United States)

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency...-1379. SUPPLEMENTARY INFORMATION: Consistent with the Privacy Act (PA), the CIA has undertaken and...

  18. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  19. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  20. Access Contested: Security, Identity, and Resistance in Asian ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-09-30

    Sep 30, 2011 ... Book cover Access Contested: Security, Identity, and Resistance in Asian ... examines the interplay of national security, social and ethnic identity, and ... Burmese media, and distributed-denial-of-service attacks and other ...

  1. Animal personality as a cause and consequence of contest behaviour.

    Science.gov (United States)

    Briffa, Mark; Sneddon, Lynne U; Wilson, Alastair J

    2015-03-01

    We review the evidence for a link between consistent among-individual variation in behaviour (animal personality) and the ability to win contests over limited resources. Explorative and bold behaviours often covary with contest behaviour and outcome, although there is evidence that the structure of these 'behavioural syndromes' can change across situations. Aggression itself is typically repeatable, but also subject to high within-individual variation as a consequence of plastic responses to previous fight outcomes and opponent traits. Common proximate mechanisms (gene expression, endocrine control and metabolic rates) may underpin variation in both contest behaviour and general personality traits. Given the theoretical links between the evolution of fighting and of personality, we suggest that longitudinal studies of contest behaviour, combining behavioural and physiological data, would be a useful context for the study of animal personalities. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  2. Another Tale of Two Cities: Contestation of Globalization in Odia ...

    African Journals Online (AJOL)

    Another Tale of Two Cities: Contestation of Globalization in Odia Ofeimun's ... state, in all its social, economic and cultural aspirations, coupled with its trappings of ... as a result of such issues as capitalism, race, nationality, identity and nativity.

  3. Sporting contests: seeing red? Putting sportswear in context.

    Science.gov (United States)

    Rowe, Candy; Harris, Julie M; Roberts, S Craig

    2005-10-27

    The shirt colour worn by sportsmen can affect the behaviour of the competitors, but Hill and Barton show that it may also influence the outcome of contests. By analysing the results of men's combat sports from the Athens 2004 Olympics, they found that more matches were won by fighters wearing red outfits than by those wearing blue; they suggest that red might confer success because it is a sign of dominance in many animal species and could signal aggression in human contests. Here we use another data set from the 2004 Olympics to show that similar winning biases occur in contests in which neither contestant wears red, indicating that a different mechanism may be responsible for these effects.

  4. Sunflower Beauty Contest : tsvetõ zimoi / Marina Poltavtseva

    Index Scriptorium Estoniae

    Poltavtseva, Marina

    2001-01-01

    Lillekleitide võistlusest Sunflower Beauty Contest Tallinna klubis Decolte. Konkursi idee on florist Tatjana Tridvornovalt. Esimese koha sai Viimsi lilleäri lilleseadjate Meri-Liis Kõivu ja Triinu Põlderi lillekleit "Talvepruut"

  5. Holiday Decorating Contest - A Way to Meet Fellow Employees | Poster

    Science.gov (United States)

    The trolls from “Frozen,” a North Pole tunnel, and a Christmas tree­–shaped periodic table of elements were just a few of the decorations on display during the second annual Holiday Decorating Contest in December. The contest, sponsored by the R&W Club Frederick, awarded prizes to three groups and two individuals whose decorations were judged based on visual impact,

  6. A national environmental design contest and capstone course for universities

    International Nuclear Information System (INIS)

    Bhada, Ron K.; Abbas Ghassemi; Deraid Morgan, J.

    1992-01-01

    The Waste-management Education and Research Consortium (WERC) of New Mexico has developed and implemented an environmental design contest for competition by universities throughout America. This is the first university environmental design contest anywhere in the world. WERC is a consortium of three universities, a community college, and two national laboratories sponsored by the DOE with the mission of generating resources to address issues associated with environmental management. The contest was structured to give university student groups from all over America an opportunity to exchange information via a national contest for design, development, and testing of an environmental control process. A practical environmental problem was presented to the competing teams. Each team prepared a total plant design for the solution of the environmental problem. They further prepared a working model to demonstrate each solution on a smaller scale. The design stressed not just the technical solution, but also such factors as economics, risk analysis, regulations, public policy and communications. The judging was preformed by experts from academia, industry and government agencies. The awards were based on the written plant design, the small demonstration, as well as presentations by the competing teams. All the criteria noted above(technical excellence, risk analysis, etc.) were weighted in the judging. Seven universities from throughout the United States competed in the first contest held in April 1991. The program fully accomplished its objective of providing a design challenge as well as providing a medium of exchanging information in the environmental area between various regions of the country. Over twenty universities have signed up to compete in next year's contest. In fact many have used the contest problem as part of their capstone design course. This paper presents the experiences of the first design contest and the topic for the second year. (author)

  7. Name agreement in picture naming : An ERP study

    NARCIS (Netherlands)

    Cheng, Xiaorong; Schafer, Graham; Akyürek, Elkan G.

    Name agreement is the extent to which different people agree on a name for a particular picture. Previous studies have found that it takes longer to name low name agreement pictures than high name agreement pictures. To examine the effect of name agreement in the online process of picture naming, we

  8. Privacy Bridges: EU and US Privacy Experts In Search of Transatlantic Privacy Solutions

    NARCIS (Netherlands)

    Abramatic, J.-F.; Bellamy, B.; Callahan, M.E.; Cate, F.; van Eecke, P.; van Eijk, N.; Guild, E.; de Hert, P.; Hustinx, P.; Kuner, C.; Mulligan, D.; O'Connor, N.; Reidenberg, J.; Rubinstein, I.; Schaar, P.; Shadbolt, N.; Spiekermann, S.; Vladeck, D.; Weitzner, D.J.; Zuiderveen Borgesius, F.; Hagenauw, D.; Hijmans, H.

    2015-01-01

    The EU and US share a common commitment to privacy protection as a cornerstone of democracy. Following the Treaty of Lisbon, data privacy is a fundamental right that the European Union must proactively guarantee. In the United States, data privacy derives from constitutional protections in the

  9. "Name" that Animal

    Science.gov (United States)

    Laird, Shirley

    2010-01-01

    In this article, the author describes a texture and pattern project. Students started by doing an outline contour drawing of an animal. With the outline drawn, the students then write one of their names to fit "inside" the animal.

  10. "Rape Culture" language and the news media: contested versus non-contested cases

    Directory of Open Access Journals (Sweden)

    April COBOS

    2014-12-01

    Full Text Available The American news media has recently reported on several rape and sexual assault cases in various cultural settings, sparking public conversations about rape culture in different cultural contexts. The article is focused as a Critical Discourse Analysis that compares the language use in news articles from The New York Times and The Wall Street Journal over a six months period in order to more clearly understand the way the news media uses language in regards to gender and sexual assault and creates a spectrum of valid versus contested reports of sexual assault in different cultural settings.

  11. Contested understandings of recovery in mental health.

    Science.gov (United States)

    McCabe, Rhiannah; Whittington, Richard; Cramond, Laura; Perkins, Elizabeth

    2018-05-17

    The concept of recovery is contested throughout the existing literature and in mental health services. Little research exists that gives voice to service user perspectives of recovery. This paper explores how service users in two recovery oriented services run by the National Health Service in North West England talked about recovery and what it meant to them. 14 service users accessing these services took part in semi-structured qualitative interviews focusing on the concept of recovery. Data were analysed using an interpretive phenomenological analysis approach. Service users talked about recovery as a dynamic, day to day process as well as an outcome; specifically related to being discharged from inpatient settings. A number of factors including relationships and medication were cited to have the potential to make or break recovery. The study highlights the continued dominance of the biomedical model in mental health services. Service users appear to have internalised staff and services' understanding of recovery perhaps unsurprisingly given the power differential in these relationships. Implications for clinical practice are explored.

  12. Contested psychiatric ontology and feminist critique

    Science.gov (United States)

    Angel, Katherine

    2012-01-01

    In this article I discuss the emergence of Female Sexual Dysfunction (FSD) within American psychiatry and beyond in the postwar period, setting out what I believe to be important and suggestive questions neglected in existing scholarship. Tracing the nomenclature within successive editions of the American Psychiatric Association’s Diagnostic and Statistical Manual (DSM), I consider the reification of the term ‘FSD’, and the activism and scholarship that the rise of the category has occasioned. I suggest that analysis of FSD benefits from scrutiny of a wider range of sources (especially since the popular and scientific cross-pollinate). I explore the multiplicity of FSD that emerges when one examines this wider range, but I also underscore a reinscribing of anxieties about psychogenic aetiologies. I then argue that what makes the FSD case additionally interesting, over and above other conditions with a contested status, is the historically complex relationship between psychiatry and feminism that is at work in contemporary debates. I suggest that existing literature on FSD has not yet posed some of the most important and salient questions at stake in writing about women’s sexual problems in this period, and can only do this when the relationship between ‘second-wave’ feminism, ‘post-feminism’, psychiatry and psychoanalysis becomes part of the terrain to be analysed, rather than the medium through which analysis is conducted. PMID:23355764

  13. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  14. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  15. Privacy Policy | FNLCR Staging

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  16. 78 FR 52117 - DoD Privacy Program

    Science.gov (United States)

    2013-08-22

    ... how the action will meet that need. An individual's privacy is a fundamental legal right that must be... and place of birth, mother's maiden name, biometric records, home phone numbers, other demographic... a photograph. (y) Risk assessment. An analysis considering information sensitivity, vulnerabilities...

  17. 78 FR 41920 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ... Civil Liberties Office Web site at http://dpclo.defense.gov/privacy/SORNs/component/army/index.html... systems of records notices. Individual should provide full name, SSN and/or DoD ID number and military... penalty of perjury under the laws of the United States of America that the foregoing is true and correct...

  18. 75 FR 13575 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-03-22

    ..., proposes to modify the Accounting Systems for the Department of Justice, Justice/DOJ-001, to update the... the system description is set forth below. FOR FURTHER INFORMATION CONTACT: Robin Moss, Privacy... NAME: Accounting Systems for the Department of Justice (DOJ). * * * * * RECORD SOURCE CATEGORIES...

  19. 75 FR 47797 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-09

    ... Officer, Department of Defense. Deletion: S330.40 CAHS System name: Employee Assistance Program Records (August 27, 1999; 64 FR 46889). Reason: This collection is covered under the existing DHHS/FOH EAP Privacy notice 09-90-0010, entitled ``Employee Assistance Program (EAP) Records, HHS/OS/ASAM/OHR.'' [FR Doc. 2010...

  20. 78 FR 45913 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2013-07-30

    ... at http://dpclo.defense.gov/privacy/SORNs/component/nsa/index.html . The proposed system report, as... Register Liaison Officer, Department of Defense. GNSA 14 System Name: NSA/CSS Library Patron File Control....'' Categories of individuals covered by the system: Delete entry and replace with ``NSA civilian employees...

  1. GAIN RATIO BASED FEATURE SELECTION METHOD FOR PRIVACY PRESERVATION

    Directory of Open Access Journals (Sweden)

    R. Praveena Priyadarsini

    2011-04-01

    Full Text Available Privacy-preservation is a step in data mining that tries to safeguard sensitive information from unsanctioned disclosure and hence protecting individual data records and their privacy. There are various privacy preservation techniques like k-anonymity, l-diversity and t-closeness and data perturbation. In this paper k-anonymity privacy protection technique is applied to high dimensional datasets like adult and census. since, both the data sets are high dimensional, feature subset selection method like Gain Ratio is applied and the attributes of the datasets are ranked and low ranking attributes are filtered to form new reduced data subsets. K-anonymization privacy preservation technique is then applied on reduced datasets. The accuracy of the privacy preserved reduced datasets and the original datasets are compared for their accuracy on the two functionalities of data mining namely classification and clustering using naïve Bayesian and k-means algorithm respectively. Experimental results show that classification and clustering accuracy are comparatively the same for reduced k-anonym zed datasets and the original data sets.

  2. A secure data privacy preservation for on-demand

    Directory of Open Access Journals (Sweden)

    Dhasarathan Chandramohan

    2017-04-01

    Full Text Available This paper spotlights privacy and its obfuscation issues of intellectual, confidential information owned by insurance and finance sectors. Privacy risk in business era if authoritarians misuse secret information. Software interruptions in steeling digital data in the name of third party services. Liability in digital secrecy for the business continuity isolation, mishandling causing privacy breaching the vicinity and its preventive phenomenon is scrupulous in the cloud, where a huge amount of data is stored and maintained enormously. In this developing IT-world toward cloud, users privacy protection is becoming a big question , albeit cloud computing made changes in the computing field by increasing its effectiveness, efficiency and optimization of the service environment etc, cloud users data and their identity, reliability, maintainability and privacy may vary for different CPs (cloud providers. CP ensures that the user’s proprietary information is maintained more secretly with current technologies. More remarkable occurrence is even the cloud provider does not have suggestions regarding the information and the digital data stored and maintained globally anywhere in the cloud. The proposed system is one of the obligatory research issues in cloud computing. We came forward by proposing the Privacy Preserving Model to Prevent Digital Data Loss in the Cloud (PPM–DDLC. This proposal helps the CR (cloud requester/users to trust their proprietary information and data stored in the cloud.

  3. Rethinking Eurovision Song Contest as a Clash of Cultures

    Directory of Open Access Journals (Sweden)

    Zeynep Merve ŞIVGIN

    2015-12-01

    Full Text Available Modern era’s understanding of culture overlooked culture, as a social and cultural analysis category as well as a way of life. This point of view has lost its validity and culture gained significance as an area where rulership and power struggle exists. Especially the privileged existence of popular culture; having an interdependence attachment to power relations in addition to an allowing structure for alternative discourses other than the official discourse is a cruicial asset. This article examines Eurovision Song Contest with its over 50 years of traditionaled history, as a noteworthy television program of popular culture. Despite often being considered as “kitsch”, the contest refers more than of an ordinary song competition. The artists who participate in the contest compete for the country they represent rather than an individual race which takes “national identity” more on stage. In this respect the contest has a stimulus effect on national consciousness. This alerted effect can clearly be seen on public debates just before, during and after the contest. It is claimed in this study that Turkey’s position in Eurovision Song Contest offers a view of the “cultural struggle” towards Western civilization since the beginning of the modernization process. In this framework this study primarily focuses on the relationship between identity and culture, followed by the role of popular culture in the construction of cultural identity. Afterwards the study tries to discover how does this contest became a tool of cultural struggle in Turkish society by analyzing the news and the discource of the news that took place in national print media.

  4. MULTIPATH COMMUNICATIONS USING NAMES

    OpenAIRE

    Purushothama, Rashmi

    2011-01-01

    Increased host mobility, and multi-homing make IP address management very complex in applications. Due to host mobility, the IP address of a host may change dynamically, and also frequently. Multi-homing leads to multiple IP addresses for a single host. Name-based socket is a solution to address the complex IP address management. It relieves the applications from the overhead, and moves it to the operating system. It uses a constant name, instead of an IP address to establish a connection, th...

  5. Towards Territorial Privacy in Smart Environments

    NARCIS (Netherlands)

    Könings, Bastian; Schaub, Florian; Weber, M.; Kargl, Frank

    Territorial privacy is an old concept for privacy of the personal space dating back to the 19th century. Despite its former relevance, territorial privacy has been neglected in recent years, while privacy research and legislation mainly focused on the issue of information privacy. However, with the

  6. Privacy Awareness: A Means to Solve the Privacy Paradox?

    Science.gov (United States)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  7. Measuring name system health

    NARCIS (Netherlands)

    Casalicchio, Emiliano; Caselli, Marco; Coletta, Alessio; Di Blasi, Salvatore; Fovino, Igor Nai; Butts, Jonathan; Shenoi, Sujeet

    2012-01-01

    Modern critical infrastructure assets are exposed to security threats arising from their use of IP networks and the Domain Name System (DNS). This paper focuses on the health of DNS. Indeed, due to the increased reliance on the Internet, the degradation of DNS could have significant consequences for

  8. Gaussian operations and privacy

    International Nuclear Information System (INIS)

    Navascues, Miguel; Acin, Antonio

    2005-01-01

    We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states

  9. Privacy 2.0

    Directory of Open Access Journals (Sweden)

    Stylianos Papathanassopoulos

    2015-04-01

    Full Text Available We live in the era of change. In this world, privacy is not a static concept, but instead has a dynamic component. Overall, it becomes clear that the public and private are not defined in the same manner as in the past and as in the actual world, while our personal information has become a commodity that can raise our visibility in the social media driven world.

  10. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  11. PRIVACY AS A CULTURAL PHENOMENON

    Directory of Open Access Journals (Sweden)

    Garfield Benjamin

    2017-07-01

    Full Text Available Privacy remains both contentious and ever more pertinent in contemporary society. Yet it persists as an ill-defined term, not only within specific fields but in its various uses and implications between and across technical, legal and political contexts. This article offers a new critical review of the history of privacy in terms of two dominant strands of thinking: freedom and property. These two conceptions of privacy can be seen as successive historical epochs brought together under digital technologies, yielding increasingly complex socio-technical dilemmas. By simplifying the taxonomy to its socio-cultural function, the article provides a generalisable, interdisciplinary approach to privacy. Drawing on new technologies, historical trends, sociological studies and political philosophy, the article presents a discussion of the value of privacy as a term, before proposing a defense of the term cyber security as a mode of scalable cognitive privacy that integrates the relative needs of individuals, governments and corporations.

  12. The privacy implications of Bluetooth

    OpenAIRE

    Kostakos, Vassilis

    2008-01-01

    A substantial amount of research, as well as media hype, has surrounded RFID technology and its privacy implications. Currently, researchers and the media focus on the privacy threats posed by RFID, while consumer groups choose to boycott products bearing RFID tags. At the same, however, a very similar technology has quietly become part of our everyday lives: Bluetooth. In this paper we highlight the fact that Bluetooth is a widespread technology that has real privacy implications. Furthermor...

  13. Theriocide: Naming Animal Killing

    Directory of Open Access Journals (Sweden)

    Piers Beirne

    2014-08-01

    Full Text Available In this essay I recommend ‘theriocide’ as the name for those diverse human actions that cause the deaths of animals. Like the killing of one human by another, theriocide may be socially acceptable or unacceptable, legal or illegal. It may be intentional or unintentional and may involve active maltreatment or passive neglect. Theriocide may occur one-on-one, in small groups or in large-scale social institutions. The numerous and sometimes intersecting sites of theriocide include intensive rearing regimes; hunting and fishing; trafficking; vivisection; militarism; pollution; and human-induced climate change. If the killing of animals by humans is as harmful to them as homicide is to humans, then the proper naming of such deaths offers a remedy, however small, to the extensive privileging of human lives over those of other animals. Inevitably, the essay leads to a shocking question: Is theriocide murder?

  14. Names For Free

    DEFF Research Database (Denmark)

    Pouillard, Nicolas; Bernardy, Jean-Philippe

    2013-01-01

    We propose a novel technique to represent names and binders in Haskell. The dynamic (run-time) representation is based on de Bruijn indices, but it features an interface to write and manipulate variables conviently, using Haskell-level lambdas and variables. The key idea is to use rich types...... and manipulation in a natural way, while retaining the good properties of representations based on de Bruijn indices....

  15. Cognitive Privacy for Personal Clouds

    Directory of Open Access Journals (Sweden)

    Milena Radenkovic

    2016-01-01

    Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.

  16. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  17. A Survey of Privacy on Data Integration

    OpenAIRE

    Do Son, Thanh

    2015-01-01

    This survey is an integrated view of other surveys on privacy preserving for data integration. First, we review the database context and challenges and research questions. Second, we formulate the privacy problems for schema matching and data matching. Next, we introduce the elements of privacy models. Then, we summarize the existing privacy techniques and the analysis (proofs) of privacy guarantees. Finally, we describe the privacy frameworks and their applications.

  18. Technical Privacy Metrics: a Systematic Survey

    OpenAIRE

    Wagner, Isabel; Eckhoff, David

    2018-01-01

    The file attached to this record is the author's final peer reviewed version The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics challenging. As a result, instead of using existing metrics, n...

  19. STUDY CONTESTING TAX RULES ON SOCIAL SECURITY CONTRIBUTIONS BY TAXPAYERS FROM ROMANIA

    Directory of Open Access Journals (Sweden)

    Adrian Doru BÎGIOI

    2015-07-01

    Full Text Available The management bodies of companies must know and correctly apply tax law. There are, however, the practical situations, when, although they want to respect this, taxpayers are penalized by the tax authorities, because it did not comply with tax obligations. There are many factors that can determine this, among which: circumvent tax rules in order to avoid paying taxes and incorrect application of law. In this study was approached the second factor, namely: analysis of the most common situations in which both taxpayers as well fiscal authorities erroneously apply tax law. To achieve these results, was developed a study regarding the determination degree of contesting the tax rules, in area of social security contributions. Data subject research was extracted in the database officially published by competent insitutions tax. The research was conducted for the period January 1, 2004 and until February 28, 2015. In terms of research methodology, were used both quantitative methods and qualitative methods. Finally, data were centralized by type of articles, they are sorted according to the extent of contestation obtained. The final conclusion is that imprecise definition of the terms tax is one of the main causes which determines incorrect application of tax law. The results can be used especially by the subjects of tax legal relationship, to avoid situations the tax law is applied incorrectly, aspects that may lead to negative situations, both companies and the state institutions.

  20. The Intra-Industry Effects of Proxy Contests

    OpenAIRE

    Fang Chen; Jian Huang; Han Yu

    2018-01-01

    This paper is the first study on the intra-industry effects of proxy contests. Using a sample of proxy contests from January 1988 through December 2008, we identify a striking cross-sectional difference in market reaction to the target companies. As much as 61% of the target firms have a significant positive cumulative abnormal return (CARs) in the period (‒10, +10) around the announcement day, while 39% of the target firms have the negative CARs in the same event window. Moreover, we find th...

  1. Sex Difference in Testosterone Response to a Video Game Contest

    OpenAIRE

    Mazur, Allan; Susman, Elizabeth J.; Edelbrock, Sandy

    1997-01-01

    Testosterone (T) and cortisol (C) were assayed from saliva samples given by young men (n = 28) and women (n = 32) before, during, and after competing with a same-sex partner in a video game. The T response to the competition is different in each sex; the C response is the same. Male results confirm prior reports of a pre-contest rise in testosterone. Male results did not confirm previous findings that after a contest, the testosterone of winners is higher than that of losers, perhaps because ...

  2. Analysis of karate injuries sustained in 295 contests.

    Science.gov (United States)

    McLatchie, G R

    1976-11-01

    The injuries sustained in 295 karate contests were analysed. It was noted that in 25 per cent of the contests there was some sort of injury, and in 10 per cent the injury was severe enough to cause the withdrawal of the participant. Injury seemed to occur most commonly among lower-grade participants and more often in the first hour of each day's competition. Protective padding of the arms, legs, feet and hands, and the use of gumshields and protective boxes appeared to reduce the incidence and severity of injury.

  3. Contestability of Container Liner Shipping Market in Alliance Era

    Directory of Open Access Journals (Sweden)

    Enna Hirata

    2017-03-01

    Full Text Available A cross section panel model is applied to estimate the effect that the Herfindahl-Hirschman Index (HHI has on container freight rates for a sample of six major container liner shipping routes during 2009 to 2011. The estimated coefficient of HHI is non-positive and statistically insignificant, indicating that higher concentration level does not lead to high price and the container liner shipping market is contestable for the period under consideration. The suggestion that efficiency can be achieved without actual competition in a contestable market is highly significant for policy makers.

  4. “Terrorists or tags”? Contested identities in media portrayal of ...

    African Journals Online (AJOL)

    Contested identities in media portrayal of militants in Nigeria. ... that have been highly contested, along political, social and religious lines. ... This approach to CDA tends to link text analysis of news stories to media production processes and ...

  5. What's in a Name?

    Science.gov (United States)

    Bonneau, Joseph; Just, Mike; Matthews, Greg

    We study the efficiency of statistical attacks on human authentication systems relying on personal knowledge questions. We adapt techniques from guessing theory to measure security against a trawling attacker attempting to compromise a large number of strangers' accounts. We then examine a diverse corpus of real-world statistical distributions for likely answer categories such as the names of people, pets, and places and find that personal knowledge questions are significantly less secure than graphical or textual passwords. We also demonstrate that statistics can be used to increase security by proactively shaping the answer distribution to lower the prevalence of common responses.

  6. What's in a name?

    Science.gov (United States)

    Whalley, Mark

    2008-03-01

    During a lesson with my A-level physics class, my school's head of English came into the lab and happened to notice the whiteboard. I had just started teaching a section on particle physics and was acquainting the students with the multitude of names found in the particle world. Among others, the board contained the words lepton, hadron, meson, baryon, photon, gluon, boson, muon, neutrino, fermion and quark. The head of English pointed out that none of the words on the board were intelligible to anyone else in the school. He added that the words themselves were utterly bizarre, although in fairness he did recognize the reference to James Joyce.

  7. The Privacy Coach: Supporting customer privacy in the Internet of Things

    OpenAIRE

    Broenink, Gerben; Hoepman, Jaap-Henk; Hof, Christian van 't; van Kranenburg, Rob; Smits, David; Wisman, Tijmen

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator between customer privacy preferences and corporate privacy policies, trying to find a match between the ...

  8. The Digital, the Virtual and the Naming of Knowledge

    Directory of Open Access Journals (Sweden)

    Darren Jorgensen

    2007-01-01

    Full Text Available Amidst changing regimes of disciplinarity, the digital has become a term used to delineate a mode of knowledge and educational methodology. Its currency comes from the technologies that share its name, yet the territory that it marks is much greater than this, referring to the cultural, economic and social. The digital is too proximate to the technological to adequately account for this territory. Instead, I argue for radical interventions in the naming of knowledge in order to defamiliarise the digital. Different accounts of the virtual by Pierre Lévy, Katherine Hayles and David Summers suggest that this term establishes a greater range of enquiry and contestation. The virtual is but one alternative to the digital as a means by which new disciplines, methodologies and pedagogies might be constituted.

  9. Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing

    Directory of Open Access Journals (Sweden)

    Daisuke Mashima

    2018-03-01

    Full Text Available Thanks to the roll-out of smart meters, availability of fine-grained electricity usage data has rapidly grown. Such data has enabled utility companies to perform robust and efficient grid operations. However, at the same time, privacy concerns associated with sharing and disclosure of such data have been raised. In this paper, we first demonstrate the feasibility of estimating privacy-sensitive household attributes based solely on the energy usage data of residential customers. We then discuss a framework to measure privacy gain and evaluate the effectiveness of customer-centric privacy-protection schemes, namely redaction of data irrelevant to services and addition of bounded artificial noise. Keywords: Privacy, Smart meter data, Quantitative evaluation

  10. Will you accept the government's friend request? Social networks and privacy concerns.

    Directory of Open Access Journals (Sweden)

    David A Siegel

    Full Text Available Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  11. Will you accept the government's friend request? Social networks and privacy concerns.

    Science.gov (United States)

    Siegel, David A

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  12. Branding a business name

    Directory of Open Access Journals (Sweden)

    Bulatović Ivan

    2016-01-01

    Full Text Available The process of globalization, international businesses, as well as competitive markets imposed the companies (large ones, as well as the others to position in the required market. Making profit, which is the basic aim of every company, in such market environment can only be achieved by demonstrating distinct characteristics of a company, the characteristics which distinguish it from others with the same or similar activities. Historical and analysis of the current market have shown that being recognizable in the multitude of similar companies is a huge challenge, but also one of the main preconditions for successful operations. The moment a company is registered it acquires a specific identity primarily owing to its business name, which distinguishes it from other companies during that first period. Practically at the same time, the company starts creating its image or goodwill by means of several distinctive ways. One of them is branding business name or corporate branding. However, apart from large benefits, companies may also have big difficulties and risks in the same process as well.

  13. Privacy Law and Print Photojournalism.

    Science.gov (United States)

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  14. Story Lab: Student Data Privacy

    Science.gov (United States)

    Herold, Benjamin

    2015-01-01

    Student data privacy is an increasingly high-profile--and controversial--issue that touches schools and families across the country. There are stories to tell in virtually every community. About three dozen states have passed legislation addressing student data privacy in the past two years, and eight different proposals were floating around…

  15. Dark Side or Bright Light: Destructive and Constructive Deviant Content in Consumer Ideation Contests

    NARCIS (Netherlands)

    Gatzweiler, A.; Blazevic, V.; Piller, F.T.

    2017-01-01

    Firms use ideation contests to generate ideas from consumers. This type of collaboration provides access to new knowledge and reveals latent consumer needs. But it also is risky, as firms give up control to an unknown crowd. Some contestants use ideation contests to post content that is unintended

  16. Using Soil and Water Conservation Contests for Extension: Experiences from the Bolivian Mountain Valleys

    NARCIS (Netherlands)

    Kessler, A.; Graaff, de J.

    2007-01-01

    Soil and water conservation (SWC) contests among farmer groups were organized in five rural villages in the Bolivian mountain valleys. The contests were aimed at quickly achieving widespread sustainable results. This article analyzes the effectiveness of these contests as an extension tool. Mixed

  17. A Hybrid Location Privacy Solution for Mobile LBS

    Directory of Open Access Journals (Sweden)

    Ruchika Gupta

    2017-01-01

    Full Text Available The prevalent usage of location based services, where getting any service is solely based on the user’s current location, has raised an extreme concern over location privacy of the user. Generalized approaches dealing with location privacy, referred to as cloaking and obfuscation, are mainly based on a trusted third party, in which all the data remain available at a central server and thus complete knowledge of the query exists at the central node. This is the major limitation of such approaches; on the other hand, in trusted third-party-free framework clients collaborate with each other and freely communicate with the service provider without any third-party involvement. Measuring and evaluating trust among peers is a crucial aspect in trusted third-party-free framework. This paper exploits the merits and mitigating the shortcomings of both of these approaches. We propose a hybrid solution, HYB, to achieve location privacy for the mobile users who use location services frequently. The proposed HYB scheme is based on the collaborative preprocessing of location data and utilizes the benefits of homomorphic encryption technique. Location privacy is achieved at two levels, namely, at the proximity level and at distant level. The proposed HYB solution preserves the user’s location privacy effectively under specific, pull-based, sporadic query scenario.

  18. Privacy and Big Data

    CERN Document Server

    Craig, Terence

    2011-01-01

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today-truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Pri

  19. Speech Privacy Problems

    Science.gov (United States)

    1945-08-18

    eondwious, «ach AnvoWnc either one or tiro staple m^aSattoa processes. The British teo -dimensioaai privacy system eUiissd both ire- oasaay ana time...of the 884 gas tube and ground showed that the tubs did not re- main fired throughout the duration of the 4- kc puls.e. Instead, the tube fired on...ouri’ent through the relay circuit was not sufficient to: permit its firm operation, especially when the amplitude of the 4~ kc pulse was low. This

  20. 77 FR 48199 - Privacy Act; System of Records: State-35, Information Access Programs Records

    Science.gov (United States)

    2012-08-13

    ..., the Privacy Act, the Ethics in Government Act, the access provisions of Executive Order 13526 or a...; requester's name and requester's mailing and email address; Social Security number (if provided by the...: Hard copy and electronic media. RETRIEVABILITY: Individual name, case number. SAFEGUARDS: All users are...

  1. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  2. Contesting “Iraq”: a social constructivist explanation | Bailie ...

    African Journals Online (AJOL)

    Using social constructivism as a theoretical lens of inquiry, sense is made of this migration. The empirical evidence that accompanies this theoretical work is drawn from the debate over the conflict in Iraq. This debate is used as a means by which to bring the contestation over the notion of “civil war” to the fore and reveal the ...

  3. CERN Photo Club (CPC) / Canon Contest - My View of CERN

    CERN Multimedia

    Steyaert, Didier

    2016-01-01

    The CERN Photo Club has organized in collaboration with Canon Switzerland a photo contest open to all members of the CERN (Persons with a CERN access card). The only restriction is that the photos must have been taken with a CANON camera (DSLR, bridge or compact) between 1 and 31 October 2016.

  4. Perspectives on ... Multiculturalism and Library Exhibits: Sites of Contested Representation

    Science.gov (United States)

    Reece, Gwendolyn J.

    2005-01-01

    This article analyzes a multicultural library exhibit presenting the Palestinian/Israeli conflict as a site of contested representation. Qualitative methodology is used to interrogate the exhibit and its audience reception. Drawing on insights from critical pedagogy, implications for libraries arising from this case study are given and suggestions…

  5. Contesting 'Patriotic History': Zimbabwe's liberation war history and ...

    African Journals Online (AJOL)

    Remarkably, the article observes that the exclusively women authored anthology on liberation war history offers an inventory of a gender based trajectory of memory, thus ... On the other hand, the sidelined demographic categories contest narrow 'patriotic history' by engineering counter discursive historical accounts.

  6. Writing Freedom: The Art of Contesting Incarceration | Maina ...

    African Journals Online (AJOL)

    Human existence and interaction is essentially characterized by a contest between individuals who at times have diametrically opposed social, political, and economic ideals. Due to the forceful nature of our idiosyncrasies, we always perceive our ideals infallible and hence as fit of being enforced on others. This attempt ...

  7. Unravelling the Contested Nature of Carbon Capture and Storage

    NARCIS (Netherlands)

    van Egmond, Sander

    2016-01-01

    Our climate is changing. Carbon Capture and Storage (CCS) has been identified as an important technology to reduce CO2 emissions in order to avoid dangerous climate change. The implementation of CCS is however slow and CCS is publicly contested. This thesis focuses on the debate on this technology.

  8. Giving Back — IDRC photo contest winner shares prize with ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-01-28

    Jan 28, 2011 ... Giving Back — IDRC photo contest winner shares prize with Senegalese colleagues ... South or the developed world are tackling the challenges of urban living. ... Upon his return to Canada, the 26-year-old wrote to IDRC the ...

  9. Contest success function with the possibility of a draw: axiomatization

    Czech Academy of Sciences Publication Activity Database

    Blavatskyy, Pavlo R.

    -, č. 208 (2004), s. 1-21 ISSN 1424-0459 Institutional research plan: CEZ:AV0Z7085904 Keywords : contest success function * logit * irrelevant alternatives Subject RIV: AH - Economics http://www.iew.unizh.ch/wp/iewwp208.pdf

  10. Contestation des Nobel une tradition aussi ancienne que leur attribution

    CERN Document Server

    Sevestre, G

    2003-01-01

    "La contestation des Nobel, avec cette annee la campagne lancee par un Americain afin de faire reconnaitre son role dans la mise au point de l'imagerie a resonance magnetique (IRM), constitue une tradition, quasiment aussi ancienne que l'attribution de ces distinctions" (1 page).

  11. Contested Space of Transborder Fishing in Timor and Arafura Seas

    Directory of Open Access Journals (Sweden)

    Shiskha Prabawaningtyas

    2017-06-01

    This paper examines the transformation of transborder fishing in Timor and Arafura Sea to demonstrated the contested space of which interplayed by local, state and international actor. State regulations had transformed transborder fishing into political space of authority competition relied on territorial sovereignty, while socio-cultural heritage reminds exploited within fluid space of livelihood survival when state function is just absent.

  12. Does Blue Uniform Color Enhance Winning Probability in Judo Contests?

    NARCIS (Netherlands)

    Dijkstra, P.D.; Preenen, P.T.Y.; Essen, H. van

    2018-01-01

    The color of an athlete's uniform may have an effect on psychological functioning and consequently bias the chances of winning contests in sport competition. Several studies reported a winning bias for judo athletes wearing a blue outfit relative to those wearing a white outfit. However, we argue

  13. 5 CFR 890.1055 - Contesting a denial of reinstatement.

    Science.gov (United States)

    2010-01-01

    ... REGULATIONS (CONTINUED) FEDERAL EMPLOYEES HEALTH BENEFITS PROGRAM Administrative Sanctions Imposed Against... reconsideration of the initial decision. A provider may contest OPM's decision to deny a reinstatement application... present oral arguments to the debarring official. The provider may be accompanied by counsel when making a...

  14. CIP's Eighth Annual Educational Software Contest: The Winners.

    Science.gov (United States)

    Donnelly, Denis

    1997-01-01

    Announces the winners of an annual software contest for innovative software in physics education. Winning entries include an application to help students visualize the origin of energy bands in a solid, a package on the radioastronomy of pulsars, and a school-level science simulation program. Also includes student winners, honorable mentions,…

  15. ECMS--Educational Contest Management System for Selecting Elite Students

    Science.gov (United States)

    Schneider, Thorsten

    2004-01-01

    Selecting elite students out of a huge collective is a difficult task. The main problem is to provide automated processes to reduce human work. ECMS (Educational Contest Management System) is an online tool approach to help--fully or partly automated--with the task of selecting such elite students out of a mass of candidates. International tests…

  16. Online videos to promote sun safety: results of a contest

    Directory of Open Access Journals (Sweden)

    Annelise Lorelei Dawson

    2011-06-01

    Full Text Available Seventy-percent of Americans search health information online, half of whom access medical content on social media websites.  In spite of this broad usage, the medical community underutilizes social media to distribute preventive health information.  This project aimed to highlight the promise of social media for delivering skin cancer prevention messaging by hosting and quantifying the impact of an online video contest. In 2010 and 2011, we solicited video submissions and searched existing YouTube videos.  Three finalists were selected and ranked. Winners were announced at national dermatology meetings and publicized via a contest website. Afterwards, YouTube view counts were monitored.  No increase in video viewing frequency was observed following the 2010 or 2011 contest.  This contest successfully identified exemplary online sun safety videos; however, increased viewership remains to be seen.  Social media offers a promising outlet for preventive health messaging. Future efforts must explore strategies for enhancing viewership of online content.

  17. Winning the young men over through a contest.

    Science.gov (United States)

    Kweeken, F A

    1987-11-01

    5 years ago, the Family Planning Association of Liberia (FPAL) was perturbed by the very minimal youth participation in its programs. Male participation was also at its lowest. The president of the Association then hit upon an innovative idea: a Gentleman of the Year contest. The contestants are selected on the basis of the following criteria: they must be between the ages of 21 and 30 years, at least high school graduates, sportsmen, and possessed of good character and good health. They should also have some knowledge of family planning. The contestants appear before the judges 5 times. For their 1st appearance they don sportswear; for their 2nd, African attire; and for the 5th, a business suit. During their 3rd and 4th appearances they display a talent and go through an interview. As a result of the contest, the FPAL can now boast a viable National Youth Department. The FPAL considers the National Youth Department its most valuable program. A budgetary allocation for it has been included in the Association's 3 year plan to enable the Department to function even more effectively. Plans are also being made for a youth seminar.

  18. Evaluating the Operational Content of Contestable Market Theory.

    Science.gov (United States)

    1986-12-01

    Aurelius , Marcus , Meditations. Harmondsworth, England: Penguin Books, Ltd., 1964. Bailey, Elizabeth and John Panzar. "The Contestability of Airline...must have as its sole aim the service and harmony of all." ( Aurelius , Book 7, Verse 5) I also thank my reader, Dr. Dennis Quinn. Accession For %’A

  19. Law as a Second-Order Essentially Contested Concept

    NARCIS (Netherlands)

    W. van der Burg (Wibren)

    2016-01-01

    markdownabstractSince Gallie introduced the notion of essentially contested concepts, it has given rise to considerable debate and confusion. The aim of this paper is to bring clarity to these debates by offering a critical reconstruction of the notion of essential contestedness. I argue that we

  20. Conservation narratives and contested protected areas in Zambia: a ...

    African Journals Online (AJOL)

    Conservation narratives and contested protected areas in Zambia: a political ecological analysis. ... Mgbakoigba: Journal of African Studies ... This paper uses a political ecological perspective to examine the link between environmental conservation narratives and resource conflicts and degradation in Zambia's protected ...

  1. Named Entity Linking Algorithm

    Directory of Open Access Journals (Sweden)

    M. F. Panteleev

    2017-01-01

    Full Text Available In the tasks of processing text in natural language, Named Entity Linking (NEL represents the task to define and link some entity, which is found in the text, with some entity in the knowledge base (for example, Dbpedia. Currently, there is a diversity of approaches to solve this problem, but two main classes can be identified: graph-based approaches and machine learning-based ones. Graph and Machine Learning approaches-based algorithm is proposed accordingly to the stated assumptions about the interrelations of named entities in a sentence and in general.In the case of graph-based approaches, it is necessary to solve the problem of identifying an optimal set of the related entities according to some metric that characterizes the distance between these entities in a graph built on some knowledge base. Due to limitations in processing power, to solve this task directly is impossible. Therefore, its modification is proposed. Based on the algorithms of machine learning, an independent solution cannot be built due to small volumes of training datasets relevant to NEL task. However, their use can contribute to improving the quality of the algorithm. The adaptation of the Latent Dirichlet Allocation model is proposed in order to obtain a measure of the compatibility of attributes of various entities encountered in one context.The efficiency of the proposed algorithm was experimentally tested. A test dataset was independently generated. On its basis the performance of the model was compared using the proposed algorithm with the open source product DBpedia Spotlight, which solves the NEL problem.The mockup, based on the proposed algorithm, showed a low speed as compared to DBpedia Spotlight. However, the fact that it has shown higher accuracy, stipulates the prospects for work in this direction.The main directions of development were proposed in order to increase the accuracy of the system and its productivity.

  2. Perspectives of Australian adults about protecting the privacy of their health information in statistical databases.

    Science.gov (United States)

    King, Tatiana; Brankovic, Ljiljana; Gillard, Patricia

    2012-04-01

    The aim of this study was to discover the public's attitude and views towards privacy in health care. This is a part of a larger project which aims to gain an insight into what kind of privacy is needed and develop technical measures to provide such privacy. The study was a two-stage process which combined qualitative and quantitative research. Stage One of the study comprised arranging and facilitating focus groups while in Stage Two we conducted a social survey. We measured attitudes towards privacy, medical research and consent; privacy concern about sharing one's health information for research; privacy concern about the possibility that some specific information from medical records could be linked to the patient's name in a situation that was not related to medical treatment. The results of the study revealed both great support for medical research (98%), and concern about privacy of health information (66%). Participants prefer to be asked for their permission before their health information is used for any purpose other than medical treatment (92%), and they would like to know the organisation and details of the research before allowing the use of their health records (83%). Age, level of education, place of birth and employment status are most strongly associated with privacy concerns. The study showed that there are some particularly sensitive issues and there is a concern (42-60%) about any possibility of linking these kinds of data to the patient's name in a situation that is not related to medical treatment. Such issues include sexually transmitted diseases, abortions and infertility, family medical history/genetic disorders, mental illness, drug/alcohol related incidents, lists of previous operations/procedures/dates and current medications. Participants believe they should be asked for permission before their health information is used for any purpose other than medical treatment. However, consent and privacy concerns are not necessary related

  3. Innovation contests to promote sexual health in china: a qualitative evaluation

    Directory of Open Access Journals (Sweden)

    Wei Zhang

    2017-01-01

    Full Text Available Abstract Background Innovation contests call on non-experts to help solve problems. While these contests have been used extensively in the private sector to increase engagement between organizations and clients, there is little data on the role of innovation contests to promote health campaigns. We implemented an innovation contest in China to increase sexual health awareness among youth and evaluated community engagement in the contest. Methods The sexual health image contest consisted of an open call for sexual health images, contest promotion activities, judging of entries, and celebrating contributions. Contest promotion activities included in-person and social media feedback, classroom didactics, and community-driven activities. We conducted 19 semi-structured interviews with a purposive sample to ensure a range of participant scores, experts and non-expert participants, submitters and non-submitters. Transcripts of each interview were coded with Atlas.ti and evaluated by three reviewers. Results We identified stages of community engagement in the contest which contributed to public health impact. Community engagement progressed across a continuum from passive, moderate, active, and finally strong engagement. Engagement was a dynamic process that appeared to have little relationship with formally submitting an image to the contest. Among non-expert participants, contest engagement increased knowledge, healthy attitudes, and empowered participants to share ideas about safe sex with others outside of the contest. Among experts who helped organize the contest, the process of implementing the contest fostered multi-sectoral collaboration and re-oriented public health leadership towards more patient-centered public health campaigns. Conclusion The results of this study suggest that innovation contests may be a useful tool for public health promotion by enhancing community engagement and re-orienting health campaigns to make them more patient-centered.

  4. Innovation contests to promote sexual health in China: a qualitative evaluation.

    Science.gov (United States)

    Zhang, Wei; Schaffer, David; Tso, Lai Sze; Tang, Songyuan; Tang, Weiming; Huang, Shujie; Yang, Bin; Tucker, Joseph D

    2017-01-14

    Innovation contests call on non-experts to help solve problems. While these contests have been used extensively in the private sector to increase engagement between organizations and clients, there is little data on the role of innovation contests to promote health campaigns. We implemented an innovation contest in China to increase sexual health awareness among youth and evaluated community engagement in the contest. The sexual health image contest consisted of an open call for sexual health images, contest promotion activities, judging of entries, and celebrating contributions. Contest promotion activities included in-person and social media feedback, classroom didactics, and community-driven activities. We conducted 19 semi-structured interviews with a purposive sample to ensure a range of participant scores, experts and non-expert participants, submitters and non-submitters. Transcripts of each interview were coded with Atlas.ti and evaluated by three reviewers. We identified stages of community engagement in the contest which contributed to public health impact. Community engagement progressed across a continuum from passive, moderate, active, and finally strong engagement. Engagement was a dynamic process that appeared to have little relationship with formally submitting an image to the contest. Among non-expert participants, contest engagement increased knowledge, healthy attitudes, and empowered participants to share ideas about safe sex with others outside of the contest. Among experts who helped organize the contest, the process of implementing the contest fostered multi-sectoral collaboration and re-oriented public health leadership towards more patient-centered public health campaigns. The results of this study suggest that innovation contests may be a useful tool for public health promotion by enhancing community engagement and re-orienting health campaigns to make them more patient-centered.

  5. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  6. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  7. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  8. Socioeconomic determinants of first names

    NARCIS (Netherlands)

    Bloothooft, G.; Onland, D.

    2011-01-01

    Modern naming practices in the Netherlands between 1982 and 2005 were studied on the basis of 1409 popular first names, divided into fourteen name groups determined by the common preferences of parents for the names involved. Socioeconomic variables such as family income, parents' level of

  9. Dictionary of Alaska place names

    Science.gov (United States)

    Orth, Donald J.

    1971-01-01

    This work is an alphabetical list of the geographic names that are now applied and have been applied to places and features of the Alaska landscape. Principal names, compiled from modem maps and charts and printed in boldface type, generally reflect present-day local usage. They conform to the principles of the U.S. Board on Geographic Names for establishing standard names for use on Government maps and in other Government publications. Each name entry gives the present-day spelling along with variant spellings and names; identifies the feature named; presents the origin and history of the name; and, where possible, gives the meaning of an Eskimo, Aleut, Indian, or foreign name. Variant, obsolete, and doubtful names are alphabetically listed and are cross referenced, where necessary, to the principal entries.

  10. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  11. History of NAMES Conferences

    Science.gov (United States)

    Filippov, Lev

    2013-03-01

    Franco-Russian NAMES Seminars are held for the purpose of reviewing and discussing actual developments in the field of materials science by researchers from Russia and from the Lorraine Region of France. In more precise terms, as set down by the organizers of the seminar (the Moscow Institute of Steel and Alloys and the Institut National Polytechnique de Lorraine), the mission of the seminars is as follows: the development of scientific and academic contacts, giving a new impulse to joint fundamental research and technology transfer the development and consolidation of scientific, technical and business collaboration between the regions of Russia and Lorraine through direct contact between the universities, institutes and companies involved The first Seminar took place on 27-29 October 2004, at the Institut National Polytechnique de Lorraine (on the premises of the Ecole Européenne d'Ingénieurs en Génie des Matériaux, Nancy, France). The number, variety and quality of the oral presentations given and posters exhibited at the first Seminar were of high international standard. 30 oral presentations were given and 72 posters were presented by 19 participants from five universities and three institutes of the Russian Academy of Sciences participants from 11 laboratories of three universities from the Lorraine region three industrial companies, including the European Aeronautic Defence and Space Company—EADS, and ANVAR (Agence Nationale de Valorisation de la Recherche) From 2005 onwards, it was decided to organize the Seminar every other year. The second Seminar convened on the occasion of the 75th Anniversary of the Moscow Institute of Steel and Alloys on 10-12 November 2005 in Moscow, Russia. The seminar demonstrated the efficiency of the scientific partnership founded between the research groups of Russia and France during the first Seminar. High productivity of the Franco-Russian scientific cooperation on the basis of the Research-Educational Franco

  12. Towards Privacy Managment of Information Systems

    OpenAIRE

    Drageide, Vidar

    2009-01-01

    This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing personal information. Following this, a strategy for evaluating the overall level of privacy in a system is defined. The strategy is then applied to parts of the cellphone system in an attempt to evaluate the privacy of traffic and location data in this system.

  13. An Alternative View of Privacy on Facebook

    OpenAIRE

    Christian Fuchs

    2011-01-01

    The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy ...

  14. Effective online privacy mechanisms with persuasive communication

    OpenAIRE

    Coopamootoo, P L

    2016-01-01

    This thesis contributes to research by taking a social psychological perspective to managing privacy online. The thesis proposes to support the effort to form a mental model that is required to evaluate a context with regards to privacy attitudes or to ease the effort by biasing activation of privacy attitudes. Privacy being a behavioural concept, the human-computer interaction design plays a major role in supporting and contributing to end users’ ability to manage their privacy online. Howev...

  15. Adding query privacy to robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2012-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity...

  16. Trajectory data privacy protection based on differential privacy mechanism

    Science.gov (United States)

    Gu, Ke; Yang, Lihao; Liu, Yongzhi; Liao, Niandong

    2018-05-01

    In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.

  17. Privacy and CHI : methodologies for studying privacy issues

    NARCIS (Netherlands)

    Patil, S.; Romero, N.A.; Karat, J.

    2006-01-01

    This workshop aims to reflect on methodologies to empirically study privacy issues related to advanced technology. The goal is to address methodological concerns by drawing upon both theoretical perspectives as well as practical experiences.

  18. 75 FR 65457 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-25

    ... number.'' CONTESTING RECORD PROCEDURES: Delete entry and replace with ``The NSA/CSS rules for contesting...' published at the beginning of the NSA/CSS's compilation of record systems also apply to this record system... number. CONTESTING RECORD PROCEDURES: The NSA/CSS rules for contesting contents and appealing initial...

  19. 29 CFR 2700.20 - Notice of contest of a citation or order issued under section 104 of the Act.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Notice of contest of a citation or order issued under... MINE SAFETY AND HEALTH REVIEW COMMISSION PROCEDURAL RULES Contests of Citations and Orders § 2700.20 Notice of contest of a citation or order issued under section 104 of the Act. (a) Who may contest. (1) An...

  20. When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System

    KAUST Repository

    Liu, Xiao; Liu, An; Zhang, Xiangliang; Li, Zhixu; Liu, Guanfeng; Zhao, Lei; Zhou, Xiaofang

    2017-01-01

    result. However, none is designed for both hiding users’ private data and preventing privacy inference. To achieve this goal, we propose in this paper a hybrid approach for privacy-preserving recommender systems by combining differential privacy (DP

  1. Performing privacy in schools

    DEFF Research Database (Denmark)

    Lauritsen, Peter; Bøge, Ask Risom; Andersen, Lars Bo

    with technologies is carried out as well as observation is conducted. We obtain and present new knowledge about how surveillance is practiced in the interpersonal relations of students and teachers. References: Monahan, T., & Torres, R. D. (2009). Schools Under Surveillance: Cultures of Control in Public Education....... Rutgers University Press. Selwyn, N. (2010). Schools and Schooling in the Digital Age: A Critical Analysis. Routledge. Taylor, E. (2013). Surveillance Schools: Security, Discipline and Control in Contemporary Education. Palgrave Macmillan UK. Taylor, E., & Rooney, T. (2016). Surveillance Futures: Social......In this presentation we pursue the question: How is privacy performed and perceived in schools by children? Our aim is to investigate how the boundaries between public and private spheres are continuously performed in the formal setting of the classroom as well as in the social lives of students...

  2. Parasiteware: Unlocking Personal Privacy

    Directory of Open Access Journals (Sweden)

    Daniel B. Garrie

    2006-09-01

    Full Text Available Spyware presents a threat of privacy infringement to unassuming internet users irrespective of their country of citizenship. European legislation attempts to protect end-users from unethical processing of their personal data. Spyware technologies, however, skirts these laws and often break them in their entirety. Outlawing the spyware and strengthening the legal consent requirement to mine data are statutory solutions that can prevent spyware users from skirting the law. An internationally standardized technology education system for the judiciaries in Europe and the U.S. can help ensure that when spyware users do break the law, they cannot hide by escaping from one nation to another without being held accountable. Transnational improvements are necessary to remedy the global spyware epidemic.

  3. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  4. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang; Papadimitriou, Panagiotis D.; Raï ssi, Chedy; Kalnis, Panos; Pung, Hungkeng

    2011-01-01

    an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data

  5. Privacy and the Connected Society

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    The Vision of the 5G enabled connected society is highly based on the evolution and implementation of Internet of Things. This involves, amongst others, a significant raise in devices, sensors and communication in pervasive interconnections as well as cooperation amongst devices and entities across...... the society. Enabling the vision of the connected society, researchers point in the direction of security and privacy as areas to challenge the vision. By use of the Internet of Things reference model as well as the vision of the connected society, this paper identifies privacy of the individual with respect...... to three selected areas: Shopping, connected cars and online gaming. The paper concludes that privacy is a complexity within the connected society vision and that thee is a need for more privacy use cases to shed light on the challenge....

  6. Librarians, Civil Liberties and Privacy.

    Science.gov (United States)

    Fielding, Derek

    1978-01-01

    A comparison of current civil liberties issues in Australia with the status of similar issues in Britain and the United States. Included are political affiliation of government employees, censorship, rights of the individual, privacy, and freedom of information. (JAB)

  7. Privacy Impact Assessment (PIA) Repository

    Data.gov (United States)

    Department of Veterans Affairs — This repository contains Privacy Impact Assessments (PIA) that have been vetted/approved. Section 208 of the Electronic Government Act of 2002 (E-Gov Act) requires...

  8. Hmong transnational identity: the gendering of contested discourses

    Directory of Open Access Journals (Sweden)

    Roberta Julian

    2005-01-01

    Full Text Available Hmong women throughout the diaspora are increasingly expressing ‘what it means to be Hmong’ and ‘what it means to be a Hmong woman’ in a variety of media that constitute western popular culture. At the same time, Hmong women residing in different nation-states live Hmong femininity differently. This paper explores the contested nature of Hmong identity through an exploration of discourses and practices at global and local levels, with a particular emphasis on their gendered dimensions. The paper argues that global narratives of Hmong identity are analytically distinct from, but empirically intertwined with, the constructions of Hmong identities across transnational social spaces. Through a focus on Hmong in Australia and the United States, the paper highlights the significance of place, generation, gender, religion, class and status as axes of contestation and debate in the construction of Hmong identities.

  9. Privacy-preserving Identity Management

    OpenAIRE

    Milutinovic, Milica

    2015-01-01

    With the technological advances and the evolution of online services, user privacy is becoming a crucial issue in the modern day society. Privacy in the general sense refers to individuals’ ability to protect information about themselves and selectively present it to other entities. This concept is nowadays strongly affected by everyday practices that assume personal data disclosure, such as online shopping and participation in loyalty schemes. This makes it difficult for an individual to con...

  10. PRIVACY CONCERNS IN FACEBOOK SITE

    OpenAIRE

    Vandana Singh

    2014-01-01

    Today social networking sites play an important role and inexpensive way to maintain existing relationships and present oneself. However, the increasing use of online sites give rise to privacy concerns and risks. All Internet sites are also under attack from phishers, fraudsters, and spammers. They aim to steal user information and expose users to unwanted spam. They have so many resources at their disposal.This paper studies the awareness of college students regarding the privacy in Faceboo...

  11. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  12. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  13. Privacy concerns in smart cities

    OpenAIRE

    van Zoonen, Liesbet

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in research about people's concerns about privacy: one dimensions represents that people perceive particular data as more personal and sensitive than others, the other dimension represents that people'...

  14. The HepTestContest: a global innovation contest to identify approaches to hepatitis B and C testing.

    Science.gov (United States)

    Tucker, Joseph D; Meyers, Kathrine; Best, John; Kaplan, Karyn; Pendse, Razia; Fenton, Kevin A; Andrieux-Meyer, Isabelle; Figueroa, Carmen; Goicochea, Pedro; Gore, Charles; Ishizaki, Azumi; Khwairakpam, Giten; Miller, Veronica; Mozalevskis, Antons; Ninburg, Michael; Ocama, Ponsiano; Peeling, Rosanna; Walsh, Nick; Colombo, Massimo G; Easterbrook, Philippa

    2017-11-01

    Innovation contests are a novel approach to elicit good ideas and innovative practices in various areas of public health. There remains limited published literature on approaches to deliver hepatitis testing. The purpose of this innovation contest was to identify examples of different hepatitis B and C approaches to support countries in their scale-up of hepatitis testing and to supplement development of formal recommendations on service delivery in the 2017 World Health Organization hepatitis B and C testing guidelines. This contest involved four steps: 1) establishment of a multisectoral steering committee to coordinate a call for contest entries; 2) dissemination of the call for entries through diverse media (Facebook, Twitter, YouTube, email listservs, academic journals); 3) independent ranking of submissions by a panel of judges according to pre-specified criteria (clarity of testing model, innovation, effectiveness, next steps) using a 1-10 scale; 4) recognition of highly ranked entries through presentation at international conferences, commendation certificate, and inclusion as a case study in the WHO 2017 testing guidelines. The innovation contest received 64 entries from 27 countries and took a total of 4 months to complete. Sixteen entries were directly included in the WHO testing guidelines. The entries covered testing in different populations, including primary care patients (n = 5), people who inject drugs (PWID) (n = 4), pregnant women (n = 4), general populations (n = 4), high-risk groups (n = 3), relatives of people living with hepatitis B and C (n = 2), migrants (n = 2), incarcerated individuals (n = 2), workers (n = 2), and emergency department patients (n = 2). A variety of different testing delivery approaches were employed, including integrated HIV-hepatitis testing (n = 12); integrated testing with harm reduction and addiction services (n = 9); use of electronic medical records to support targeted testing (n = 8

  15. The HepTestContest: a global innovation contest to identify approaches to hepatitis B and C testing

    Directory of Open Access Journals (Sweden)

    Joseph D. Tucker

    2017-11-01

    Full Text Available Abstract Background Innovation contests are a novel approach to elicit good ideas and innovative practices in various areas of public health. There remains limited published literature on approaches to deliver hepatitis testing. The purpose of this innovation contest was to identify examples of different hepatitis B and C approaches to support countries in their scale-up of hepatitis testing and to supplement development of formal recommendations on service delivery in the 2017 World Health Organization hepatitis B and C testing guidelines. Methods This contest involved four steps: 1 establishment of a multisectoral steering committee to coordinate a call for contest entries; 2 dissemination of the call for entries through diverse media (Facebook, Twitter, YouTube, email listservs, academic journals; 3 independent ranking of submissions by a panel of judges according to pre-specified criteria (clarity of testing model, innovation, effectiveness, next steps using a 1-10 scale; 4 recognition of highly ranked entries through presentation at international conferences, commendation certificate, and inclusion as a case study in the WHO 2017 testing guidelines. Results The innovation contest received 64 entries from 27 countries and took a total of 4 months to complete. Sixteen entries were directly included in the WHO testing guidelines. The entries covered testing in different populations, including primary care patients (n = 5, people who inject drugs (PWID (n = 4, pregnant women (n = 4, general populations (n = 4, high-risk groups (n = 3, relatives of people living with hepatitis B and C (n = 2, migrants (n = 2, incarcerated individuals (n = 2, workers (n = 2, and emergency department patients (n = 2. A variety of different testing delivery approaches were employed, including integrated HIV-hepatitis testing (n = 12; integrated testing with harm reduction and addiction services (n = 9; use of electronic medical records to

  16. Guobin Yang (ed.), China’s Contested Internet,

    OpenAIRE

    Arsène, Séverine

    2016-01-01

    China’s Contested Internet is a collective book composed of 10 chapters, seven of which were previously published in a special issue of China Information in July 2014. With case studies ranging from around 2006 to 2013, this collection of papers covers some of the most salient phenomena that have characterised the Chinese Internet over the last decade: e-government initiatives such as public consultation on the health system reform project (Steven J. Balla), and municipal microblogs (Jesper S...

  17. Winner of video contest inspired by the LHC

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    A video contest was launched this year to mark the 10th anniversary of the Frederick Phineas and Sandra Priest Rose Centre for Earth and Space. Luke Cahill, a 27 year-old BFA graduate, has just won the contest with a movie about CERN.   Luke, who works in the film industry in Los Angeles and also takes physics classes, came across a video promoting the contest while he was browsing the American Natural History Museum website. "It seemed like a perfect opportunity to combine my passion for science with my craft of filmmaking", says Luke. Luke decided to make a video about the LHC. To him, CERN embodies the ideals of scientific progress and discovery, continually expanding the boundaries of our knowledge. "I have never actually been to CERN but it's high on the list of places I want to visit when I travel to Europe", says Luke. There is a lot of misleading information on the Internet about CERN – especially about the LHC. Luke wanted to clarify what the ...

  18. Experience affects the outcome of agonistic contests without affecting the selective advantage of size.

    Science.gov (United States)

    Kasumovic, Michael M; Elias, Damian O; Punzalan, David; Mason, Andrew C; Andrade, Maydianne C B

    2009-06-01

    In the field, phenotypic determinants of competitive success are not always absolute. For example, contest experience may alter future competitive performance. As future contests are not determined solely on phenotypic attributes, prior experience could also potentially alter phenotype-fitness associations. In this study, we examined the influence of single and multiple experiences on contest outcomes in the jumping spider Phidippus clarus. We also examined whether phenotype-fitness associations altered as individuals gained more experience. Using both size-matched contests and a tournament design, we found that both winning and losing experience affected future contest success; males with prior winning experience were more likely to win subsequent contests. Although experience was a significant determinant of success in future contests, male weight was approximately 1.3 times more important than experience in predicting contest outcomes. Despite the importance of experience in determining contest outcomes, patterns of selection did not change between rounds. Overall, our results show that experience can be an important determinant in contest outcomes, even in short-lived invertebrates, and that experience alone is unlikely to alter phenotype-fitness associations.

  19. Can You Say My Name?

    DEFF Research Database (Denmark)

    Erz, Antonia; Christensen, Bo T.

    Whereas brand name research has focused on the semantic meaning or sounds of names, processing fluency lends further support to the idea that meaning goes beyond semantics. Extant research has shown that phonological fluency, i.e., the ease or difficulty with which people pronounce names, can...

  20. A family of names : rune-names and ogam-names and their relation to alphabet letter-names

    NARCIS (Netherlands)

    Griffiths, Alan

    2013-01-01

    The current consensus is that vernacular names assigned to the runes of the Germanic fuþark and to Irish ogam characters are indigenous creations independent of Mediterranean alphabet traditions. I propose, however, that ogam-names are based on interpretations of Hebrew, Greek or Latin letter-names

  1. The NASA Tournament Laboratory (“NTL”): Improving Data Access at PDS while Spreading Joy and Engaging Students through 16 Micro-Contests

    Science.gov (United States)

    LaMora, Andy; Raugh, A.; Erickson, K.; Grayzeck, E. J.; Knopf, W.; Lydon, M.; Lakhani, K.; Crusan, J.; Morgan, T. H.

    2012-10-01

    NASA PDS hosts terabytes of valuable data from hundreds of data sources and spans decades of research. Data is stored on flat-file systems regulated through careful meta dictionaries. PDS’s data is available to the public through its website which supports data searches through drill-down navigation. While the system returns data quickly, result sets in response to identical input differ depending on the drill-down path a user follows. To correct this issue, to allow custom searching, and to improve general accessibility, PDS sought to create a new data structure and API, and to use them to build applications that are a joy to use and showcase the value of the data to students, teachers and citizens. PDS engaged TopCoder and Harvard Business School through the NTL to pursue these objectives in a pilot effort. Scope was limited to Small Bodies Node data. NTL analyzed data, proposed a solution, and implemented it through a series of micro-contests. Contest focused on different segments of the problem; conceptualization, architectural design, implementation, testing, etc. To demonstrate the utility of the completed solution, NTL developed web-based and mobile applications that can compare targets, regardless of mission. To further explore the potential of the solution NTL hosted “Mash-up” challenges that integrated the API with other publically available assets, to produce consumer and teaching applications, including an Augmented Reality iPad tool. Two contests were also posted to middle and high school students via the NoNameSite.com platform, and as a result of these contests, PDS/SBN has initiated a Facebook program. These contests defined and implemented a data warehouse with the necessary migration tools to transform legacy data, produced a public web interface for the new search, developed a public API, and produced four mobile applications that we expect to appeal to users both within and without the academic community.

  2. The NASA Tournament Laboratory (NTL): Improving Data Access at PDS while Spreading Joy and Engaging Students through 16 Micro-Contests

    Science.gov (United States)

    LaMora, Andy; Raugh, A.; Erickson, K.; Grayzeck, E. J.; Knopf, W.; Morgan, T. H.

    2012-01-01

    NASA PDS hosts terabytes of valuable data from hundreds of data sources and spans decades of research. Data is stored on flat-file systems regulated through careful meta dictionaries. PDS's data is available to the public through its website which supports data searches through drill-down navigation. While the system returns data quickly, result sets in response to identical input differ depending on the drill-down path a user follows. To correct this Issue, to allow custom searching, and to improve general accessibility, PDS sought to create a new data structure and API, and to use them to build applications that are a joy to use and showcase the value of the data to students, teachers and citizens. PDS engaged TopCoder and Harvard Business School through the NTL to pursue these objectives in a pilot effort. Scope was limited to Small Bodies Node data. NTL analyzed data, proposed a solution, and implemented it through a series of micro-contests. Contest focused on different segments of the problem; conceptualization, architectural design, implementation, testing, etc. To demonstrate the utility of the completed solution, NTL developed web-based and mobile applications that can compare targets, regardless of mission. To further explore the potential of the solution NTL hosted "Mash-up" challenges that integrated the API with other publically available assets, to produce consumer and teaching applications, including an Augmented Reality iPad tool. Two contests were also posted to middle and high school students via the NoNameSite.com platform, and as a result of these contests, PDS/SBN has initiated a Facebook program. These contests defined and implemented a data warehouse with the necessary migration tools to transform legacy data, produced a public web interface for the new search, developed a public API, and produced four mobile applications that we expect to appeal to users both within and, without the academic community.

  3. A Privacy-Preserving NFC Mobile Pass for Transport Systems

    Directory of Open Access Journals (Sweden)

    Ghada Arfaoui

    2014-12-01

    Full Text Available The emergence of the NFC (Near Field Communication technology brings new capacities to the next generation of smartphones, but also new security and privacy challenges. Indeed through its contactless interactions with external entities, the smartphone of an individual will become an essential authentication tool for service providers such as transport operators. However, from the point of view of the user, carrying a part of the service through his smartphone could be a threat for his privacy. Indeed, an external attacker or the service provider himself could be tempted to track the actions of the user. In this paper, we propose a privacy-preserving contactless mobile service, in which a user’s identity cannot be linked to his actions when using the transport system. The security of our proposition relies on the combination of a secure element in the smartphone and on a privacy-enhancing cryptographic protocol based on a variant of group signatures. In addition, although a user should remain anonymous and his actions unlinkable in his daily journeys, we designed a technique for lifting his anonymity in extreme circumstances. In order to guarantee the usability of our solution, we implemented a prototype demonstrating that our solution meets the major functional requirements for real transport systems: namely that the mobile pass can be validated at a gate in less than 300 ms, and this even if the battery of the smartphone is exhausted.

  4. GEOGRAPHIC NAMES INFORMATION SYSTEM (GNIS) ...

    Science.gov (United States)

    The Geographic Names Information System (GNIS), developed by the U.S. Geological Survey in cooperation with the U.S. Board on Geographic Names (BGN), contains information about physical and cultural geographic features in the United States and associated areas, both current and historical, but not including roads and highways. The database also contains geographic names in Antarctica. The database holds the Federally recognized name of each feature and defines the location of the feature by state, county, USGS topographic map, and geographic coordinates. Other feature attributes include names or spellings other than the official name, feature designations, feature class, historical and descriptive information, and for some categories of features the geometric boundaries. The database assigns a unique feature identifier, a random number, that is a key for accessing, integrating, or reconciling GNIS data with other data sets. The GNIS is our Nation's official repository of domestic geographic feature names information.

  5. Cassini Scientist for a Day: an international contest in Greece

    Science.gov (United States)

    Solomonidou, Anezina; Moussas, Xenophon; Xystouris, Georgios; Coustenis, Athena; Lebreton, Jean-Pierre; Katsavrias, Christos; Bampasidis, Georgios; Kyriakopoulos, Konstantinos; Kouloumvakos, Athanasios; Patsou, Ioanna

    2013-04-01

    The Cassini Outreach Team of NASA's Jet Propulsion Laboratory is being organizing a brilliant school contest in Astronomy focusing in the Saturnian system. This essay contest provides school students all around the worlds with the opportunity to get involved in astronomy and astrophysics and planetary sciences in particular. From 2010 the 'Cassini Scientist for a Day' contest has being one of the most successful as well as important outreach activities of ESA and NASA in Greece with hundreds of participants all over Greece. The number of participants is growing rapidly every year. This type of school competition in Greece is particularly important since Astronomy and Astrophysics and Space Sciences, although very popular, are not included in the school curricula and thus students rarely have the opportunity to experience and participate actively in these subjects. For the years 2010 and 2011, the Space Physics Group of the Astronomy, Astrophysics and Mechanics section of the University of Athens in association with external colleagues has been selected as the co-ordinator of NASA for the competition in Greece. Under the guidance of Cassini Outreach team, the members of the Space Physics Group have informed, explained and spread the rules of the competition at primary, secondary and high schools all over Greece. In general, the students have the option to choose Cassini monitoring between three targets of the Saturnian system, which the participants show that will bring the best scientific result. Their arguments should be summarized in an essay of 500 words more or less. They also have the option to do team work through groups of maximum three students. The participation in the contest for 2010 was unexpectedly high and thoroughly satisfied. The winners awarded through a ceremony which was held in the largest amphitheater at the central building of the University of Athens, that was fully packed. The following year 2011 the participation increased up to 300% while

  6. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  7. Privacy in the Genomic Era.

    Science.gov (United States)

    Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W; Fellay, Jacques; Gunter, Carl A; Hubaux, Jean-Pierre; Malin, Bradley A; Wang, Xiaofeng

    2015-09-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.

  8. Privacy in the Genomic Era

    Science.gov (United States)

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  9. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  10. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... DEPARTMENT OF AGRICULTURE Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records... two Privacy Act Systems of Records entitled ``Information on Persons Disqualified from the...

  11. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-11-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-109)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  12. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-093)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  13. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-091)] Privacy Act of 1974; Privacy Act...: Revisions of NASA Appendices to Privacy Act System of Records. SUMMARY: Notice is hereby given that NASA is... Privacy Act of 1974. This notice publishes those amendments as set forth below under the caption...

  14. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-07-05

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-071] Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Each Federal agency is required by the Privacy Act of 1974 to publish...

  15. 78 FR 77503 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-12-23

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-149] Privacy Act of 1974; Privacy Act... proposed revisions to existing Privacy Act systems of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  16. 77 FR 69898 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2012-11-21

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 12-100] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  17. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...

  18. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  19. CARAVAN: Providing Location Privacy for VANET

    National Research Council Canada - National Science Library

    Sampigethaya, Krishna; Huang, Leping; Li, Mingyan; Poovendran, Radha; Matsuura, Kanta; Sezaki, Kaoru

    2005-01-01

    .... This type of tracking leads to threats on the location privacy of the vehicle's user. In this paper, we study the problem of providing location privacy in VANET by allowing vehicles to prevent tracking of their broadcast communications...

  20. Optical Interference Coatings Design Contest 2007: triple bandpass filter and nonpolarizing beam splitter.

    Science.gov (United States)

    Tilsch, Markus; Hendrix, Karen

    2008-05-01

    A triple bandpass filter (28 solutions received) and a nonpolarizing beam splitter (23 solutions received) were the subjects of the design contest held in conjunction with the 2007 Optical Interference Coatings topical meeting of the Optical Society of America. Fifteen designers participated using a wide spectrum of design approaches and optimization strategies to create the submissions. The results differ significantly, but all meet the contest requirements. Fabien Lemarchand wins both contests by submitting the thinnest (6254 nm) triple bandpass design and the widest (61.7 nm) nonpolarizing beam-splitter design. Michael Trubetskov is in second place, followed by Vladimir Pervak in both contests. The submitted designs are described and evaluated.

  1. Names of Southern African grasses: Name changes and additional ...

    African Journals Online (AJOL)

    The main reasons for changes in botanical names are briefly reviewed, with examples from the lists. At this time, about 1040 grass species and subspecific taxa are recognized in the subcontinent. Keywords: botanical research; botanical research institute; botany; grass; grasses; identification; name change; nomenclature; ...

  2. SIED, a Data Privacy Engineering Framework

    OpenAIRE

    Mivule, Kato

    2013-01-01

    While a number of data privacy techniques have been proposed in the recent years, a few frameworks have been suggested for the implementation of the data privacy process. Most of the proposed approaches are tailored towards implementing a specific data privacy algorithm but not the overall data privacy engineering and design process. Therefore, as a contribution, this study proposes SIED (Specification, Implementation, Evaluation, and Dissemination), a conceptual framework that takes a holist...

  3. Privacy and Data-Based Research

    OpenAIRE

    Ori Heffetz; Katrina Ligett

    2013-01-01

    What can we, as users of microdata, formally guarantee to the individuals (or firms) in our dataset, regarding their privacy? We retell a few stories, well-known in data-privacy circles, of failed anonymization attempts in publicly released datasets. We then provide a mostly informal introduction to several ideas from the literature on differential privacy, an active literature in computer science that studies formal approaches to preserving the privacy of individuals in statistical databases...

  4. PriBots: Conversational Privacy with Chatbots

    OpenAIRE

    Harkous, Hamza; Fawaz, Kassem; Shin, Kang G.; Aberer, Karl

    2016-01-01

    Traditional mechanisms for delivering notice and enabling choice have so far failed to protect users’ privacy. Users are continuously frustrated by complex privacy policies, unreachable privacy settings, and a multitude of emerging standards. The miniaturization trend of smart devices and the emergence of the Internet of Things (IoTs) will exacerbate this problem further. In this paper, we propose Conversational Privacy Bots (PriBots) as a new way of delivering notice and choice through a two...

  5. 39 CFR 262.5 - Systems (Privacy).

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  6. Cognitive components of picture naming.

    Science.gov (United States)

    Johnson, C J; Paivio, A; Clark, J M

    1996-07-01

    A substantial research literature documents the effects of diverse item attributes, task conditions, and participant characteristics on the case of picture naming. The authors review what the research has revealed about 3 generally accepted stages of naming a pictured object: object identification, name activation, and response generation. They also show that dual coding theory gives a coherent and plausible account of these findings without positing amodal conceptual representations, and they identify issues and methods that may further advance the understanding of picture naming and related cognitive tasks.

  7. Fictional names and fictional discourse

    OpenAIRE

    Panizza, Chiara

    2017-01-01

    [eng] In this dissertation I present a critical study of fiction, focusing on the semantics of fictional names and fictional discourse. I am concerned with the issue of whether fictional names need to refer, and also with the related issue of whether fictional characters need to exist, in order to best account for our linguistic practices involving fictional names. Fictional names like ‘Sherlock Holmes’, ‘Anna Karenina’, ‘Emma Woodhouse’ and ‘Don Quixote of La Mancha’ ordinarily occur in diff...

  8. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...... data is anonymized in the system using data cloaking and data swapping techniques. Finally, the paper empirically demonstrates that the proposed system is effective and feasible....

  9. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    with any other entity, including the service provider. Such privacy concerns lead to trust issues between entities, which clearly damages the functioning of the service and even blocks cooperation between entities with similar data sets. To enable joint efforts with private data, we propose a protocol......, or in some cases, information from different databases is pooled to enrich the data so that the merged database can improve the clustering effort. However, in either case, the content of the database may be privacy sensitive and/or commercially valuable such that the owners may not want to share their data...... provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner....

  10. Privacy in the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Etter, Michael; Lutz, Christoph

    ’s digital services through providing recommendations to Europe’s institutions. The initial stage of this research project involves a set of three literature reviews of the state of research on three core topics in relation to the sharing economy: participation (1), privacy (2), and power (3). This piece...... is a literature review on the topic of privacy. It addresses key privacy challenges for different stakeholders in the sharing economy. Throughout, we use the term "consumers" to refer to users on the receiving end (e.g., Airbnb guests, Uber passengers), "providers" to refer to users on the providing end (e.......g., Airbnb hosts, Uber drivers) and "platforms" to refer to the mediating sites, apps and infrastructures matching consumers and providers (e.g., Airbnb, Uber)....

  11. Context-Aware Generative Adversarial Privacy

    Directory of Open Access Journals (Sweden)

    Chong Huang

    2017-12-01

    Full Text Available Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP. GAP leverages recent advancements in generative adversarial networks (GANs to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals’ private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP’s performance, we investigate two simple (yet canonical statistical dataset models: (a the binary data model; and (b the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  12. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  13. 31 CFR 0.216 - Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act of...

  14. 24 CFR 3280.107 - Interior privacy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  15. Context-Aware Generative Adversarial Privacy

    Science.gov (United States)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  16. 49 CFR 10.13 - Privacy Officer.

    Science.gov (United States)

    2010-10-01

    ... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13...

  17. Enhancing Privacy for Digital Rights Management

    NARCIS (Netherlands)

    Petkovic, M.; Conrado, C.; Schrijen, G.J.; Jonker, Willem

    2007-01-01

    This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM

  18. Access to Information and Privacy | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As a Crown corporation, IDRC is subject to Canada's laws on access to information and privacy protection. The following resources will help you learn more about IDRC and the access to information and privacy acts, including instructions for submitting an access to information or privacy act (ATIP) request. IDRC and ATIP ...

  19. Contested Hydrohegemony: Hydraulic Control and Security in Turkey

    Directory of Open Access Journals (Sweden)

    Jeroen Warner

    2008-10-01

    The present analysis suggests that Turkey’s basin and regional hegemony is contested and constrained from different sides, not least at home. Its water projects are a flashpoint of domestic, basin as well as global politics. It argues that the need to access capital in the international market to realise these ambitions necessitated a 'passive revolution' in Turkey which opened a window of opportunity utilised by the internationalised counter-hegemonic moves against Turkey’s dam projects in Southeast Anatolia, notably the ongoing Ilisu dam on the Tigris.

  20. Does Blue Uniform Color Enhance Winning Probability in Judo Contests?

    OpenAIRE

    Dijkstra, Peter D.; Preenen, Paul T. Y.; van Essen, Hans

    2018-01-01

    The color of an athlete's uniform may have an effect on psychological functioning and consequently bias the chances of winning contests in sport competition. Several studies reported a winning bias for judo athletes wearing a blue outfit relative to those wearing a white outfit. However, we argue there is no winning bias and that previous studies were confounded and based on small and specific data sets. We tested whether blue biases winning in judo using a very extensive judo data set (45,87...

  1. Into the black. 1993 Hospital Turnaround Contest winners.

    Science.gov (United States)

    Cerne, F; Bergman, R

    1993-07-20

    Turning a hospital around takes a lot more than adjusting the financials, as the winners and finalists in the Great Comebacks 1993: The Hospital Turnaround Contest demonstrate. In every case we report on, the hospital being recognized has worked intensively with its community to reassess the services needed by its patients, build support for major management and delivery changes, and articulate the reasons for the strategies being used. Each of the eight hospital organizations we profile, which are spread across the country from Texas to Wisconsin to Maine to North Carolina--has put together its own version of success--in other words, eight lessons in innovation and progress.

  2. Contested Regional Orders and Institutional Balancing in the Asia Pacific

    DEFF Research Database (Denmark)

    He, Kai

    2015-01-01

    . On the basis of institutional balancing theory, I argue that (i) China’s rise has led to a competition among different regional orders, that is, the US-led bilateralism versus ASEAN-centered and China-supported multilateralism. However, conflicts or wars are not inevitable since the contested regional orders...... can coexist in the Asia Pacific. (ii) The deepening economic interdependence has encouraged regional powers, including the United States, China and ASEAN, to rely on different institutional balancing strategies to pursue security after the Cold War....

  3. Smartdata privacy meets evolutionary robotics

    CERN Document Server

    Harvey, Inman; Tomko, George

    2013-01-01

    Privacy by Design and the Promise of SmartData.- SmartData: the Need, the Goal and the Challenge.- Perspectives on Artificial Intelligence.- Context dependent information processing entails scale-free dynamics.- Philosophy and SmartData.- Relevance Realization and the Neurodynamics and Neural Connectivity of General Intelligence.- What Matters: Real Bodies and Virtual Worlds.- The development of autonomous virtual agents.- Patterns of Attractors in the "Brain"".- A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services.- Unconstraint the Population: the Benefits of Horiz

  4. Preserving Employee Privacy in Wellness.

    Science.gov (United States)

    Terry, Paul E

    2017-07-01

    The proposed "Preserving Employee Wellness Programs Act" states that the collection of information about the manifested disease or disorder of a family member shall not be considered an unlawful acquisition of genetic information. The bill recognizes employee privacy protections that are already in place and includes specific language relating to nondiscrimination based on illness. Why did legislation expressly intending to "preserve wellness programs" generate such antipathy about wellness among journalists? This article argues that those who are committed to preserving employee wellness must be equally committed to preserving employee privacy. Related to this, we should better parse between discussions and rules about commonplace health screenings versus much less common genetic testing.

  5. Location Privacy with Randomness Consistency

    Directory of Open Access Journals (Sweden)

    Wu Hao

    2016-10-01

    Full Text Available Location-Based Social Network (LBSN applications that support geo-location-based posting and queries to provide location-relevant information to mobile users are increasingly popular, but pose a location-privacy risk to posts. We investigated existing LBSNs and location privacy mechanisms, and found a powerful potential attack that can accurately locate users with relatively few queries, even when location data is well secured and location noise is applied. Our technique defeats previously proposed solutions including fake-location detection and query rate limits.

  6. A name is a name is a name: some thoughts and personal opinions about molluscan scientific names

    NARCIS (Netherlands)

    Dance, S.P.

    2009-01-01

    Since 1758, with the publication of Systema Naturae by Linnaeus, thousands of scientific names have been proposed for molluscs. The derivation and uses of many of them are here examined from various viewpoints, beginning with names based on appearance, size, vertical distribution, and location.

  7. Privacy context model for dynamic privacy adaptation in ubiquitous computing

    NARCIS (Netherlands)

    Schaub, Florian; Koenings, Bastian; Dietzel, Stefan; Weber, M.; Kargl, Frank

    Ubiquitous computing is characterized by the merger of physical and virtual worlds as physical artifacts gain digital sensing, processing, and communication capabilities. Maintaining an appropriate level of privacy in the face of such complex and often highly dynamic systems is challenging. We argue

  8. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... of the companies have comprehensive privacy programs, although more than half of them voice moral or relational motives for addressing online privacy. The privacy measures they have taken are primarily compliance measures, while measures that stimulate a stakeholder dialogue are rare. Overall, a wide variety...

  9. The Regulatory Framework for Privacy and Security

    Science.gov (United States)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  10. Adding Query Privacy to Robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2011-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... of obtaining query privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity and only a small overhead in the computational complexity....

  11. Contested Space of Transborder Fishing in Timor and Arafura Seas

    Directory of Open Access Journals (Sweden)

    Shiskha Prabawaningtyas

    2017-06-01

    Full Text Available The continuity of Indonesian transborder fishing activities into Australian Fishing Zone (AFZ highlights the rooted dispute of maritime border when contested space of boundary shared by local, state and international actor is confronted. Therefore, the prevailing of multilayer perspective of maritime boundary should not be easily neglected. The colonial project in early 19th century in Southeast Asia that initiated the foundation of modern state-formation had challenged the prior-political and economic construction of the region, specifically on the issue of territoriality. The modernization of shipping and fishing activities of which relied on technology and capitals had generated political and economic competitions and later persuaded state’s actors of applying the strategy of the territorialisation of the sea in order to ensure control. Unavoidably, securitization of transborder fishing became preferable solution. Transborder fishings are further subjected into state control relied on territorial sovereignty. This paper examines the transformation of transborder fishing in Timor and Arafura Sea to demonstrated the contested space of which interplayed by local, state and international actor. State regulations had transformed transborder fishing into political space of authority competition relied on territorial sovereignty, while socio-cultural heritage reminds exploited within fluid space of livelihood survival when state function is just absent.

  12. Does Blue Uniform Color Enhance Winning Probability in Judo Contests?

    Directory of Open Access Journals (Sweden)

    Peter D. Dijkstra

    2018-01-01

    Full Text Available The color of an athlete's uniform may have an effect on psychological functioning and consequently bias the chances of winning contests in sport competition. Several studies reported a winning bias for judo athletes wearing a blue outfit relative to those wearing a white outfit. However, we argue there is no winning bias and that previous studies were confounded and based on small and specific data sets. We tested whether blue biases winning in judo using a very extensive judo data set (45,874 contests from all international judo tournaments between 2008 and 2014. In judo, the first called athlete for the fight used to wear the blue judogi but this was changed to the white judogi in 2011. This switch enabled us to compare the win bias before and after this change to isolate the effect of the color of the judogi. We found a significant win bias for the first called athlete, but this effect was not significantly related to the color of the judogi. The lack of a significant win effect of judogi color suggests that blue does not bias winning in judo, and that the blue-white pairing ensures an equal level of play. Our study shows the importance of thoroughly considering alternative explanations and using extensive datasets in color research in sports and psychology.

  13. Does Blue Uniform Color Enhance Winning Probability in Judo Contests?

    Science.gov (United States)

    Dijkstra, Peter D; Preenen, Paul T Y; van Essen, Hans

    2018-01-01

    The color of an athlete's uniform may have an effect on psychological functioning and consequently bias the chances of winning contests in sport competition. Several studies reported a winning bias for judo athletes wearing a blue outfit relative to those wearing a white outfit. However, we argue there is no winning bias and that previous studies were confounded and based on small and specific data sets. We tested whether blue biases winning in judo using a very extensive judo data set (45,874 contests from all international judo tournaments between 2008 and 2014). In judo, the first called athlete for the fight used to wear the blue judogi but this was changed to the white judogi in 2011. This switch enabled us to compare the win bias before and after this change to isolate the effect of the color of the judogi . We found a significant win bias for the first called athlete, but this effect was not significantly related to the color of the judogi . The lack of a significant win effect of judogi color suggests that blue does not bias winning in judo, and that the blue-white pairing ensures an equal level of play. Our study shows the importance of thoroughly considering alternative explanations and using extensive datasets in color research in sports and psychology.

  14. Multi-language naming game

    Science.gov (United States)

    Zhou, Jianfeng; Lou, Yang; Chen, Guanrong; Tang, Wallace K. S.

    2018-04-01

    Naming game is a simulation-based experiment used to study the evolution of languages. The conventional naming game focuses on a single language. In this paper, a novel naming game model named multi-language naming game (MLNG) is proposed, where the agents are different-language speakers who cannot communicate with each other without a translator (interpreter) in between. The MLNG model is general, capable of managing k different languages with k ≥ 2. For illustration, the paper only discusses the MLNG with two different languages, and studies five representative network topologies, namely random-graph, WS small-world, NW small-world, scale-free, and random-triangle topologies. Simulation and analysis results both show that: 1) using the network features and based on the proportion of translators the probability of establishing a conversation between two or three agents can be theoretically estimated; 2) the relationship between the convergence speed and the proportion of translators has a power-law-like relation; 3) different agents require different memory sizes, thus a local memory allocation rule is recommended for saving memory resources. The new model and new findings should be useful for further studies of naming games and for better understanding of languages evolution from a dynamical network perspective.

  15. Student Data Privacy Communications Toolkit

    Science.gov (United States)

    Foundation for Excellence in Education, 2016

    2016-01-01

    Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…

  16. Privacy proof in the cloud

    NARCIS (Netherlands)

    Jessen, Veerle; Weigand, Hans; Mouratidis, Haris

    Cloud computing has been a frequently researched subject as it brings many advantages, such as the ability to store data remotely and scale rapidly, but also comes with several issues, including privacy, trust and security. The decision whether it is best to go `into the cloud' or to `stay inside'

  17. Patient privacy and social media.

    Science.gov (United States)

    Hader, Amy L; Brown, Evan D

    2010-08-01

    Healthcare providers using social media must remain mindful of professional boundaries and patients' privacy rights. Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics.

  18. Facebook: When Education Meets Privacy

    Science.gov (United States)

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  19. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  20. Privacy in Online Social Networks

    NARCIS (Netherlands)

    Beye, Michael; Jeckmans, Arjan; Erkin, Zekeriya; Erkin, Zekeriya; Hartel, Pieter H.; Lagendijk, Reginald; Tang, Qiang; Abraham, A.

    Online Social Networks (OSNs) have become part of daily life for millions of users. Users building explicit networks that represent their social relationships and often share a wealth of personal information to their own benefit. The potential privacy risks of such behavior are often underestimated

  1. The European Approach to Privacy

    NARCIS (Netherlands)

    van Hoboken, J.

    2014-01-01

    This paper critically assesses the character of European (Union’s) privacy law and policy in the field of online media and electronic communications. Contrary to current understanding, this field of law is more fragmented and ill-developed than is often assumed, in particular by those discussing

  2. Biobanking and Privacy in India.

    Science.gov (United States)

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India. © 2016 American Society of Law, Medicine & Ethics.

  3. 78 FR 46256 - Privacy Act

    Science.gov (United States)

    2013-07-31

    ... FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code of 1954.'' are added at the end of the definition of Act. [FR Doc. 2013-18535 Filed 7...

  4. Privacy concerns in smart cities

    NARCIS (Netherlands)

    E.A. van Zoonen (Liesbet)

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in

  5. Protecting Your Child's Privacy Online

    Science.gov (United States)

    ... Keeping Up With Kids' Apps infographic Kids and Computer Security Kids and Mobile Phones Kids and Socializing Online ... email Looking for business guidance on privacy and ... The Federal Trade Commission (FTC) is the nation’s consumer protection agency. The FTC works to prevent fraudulent, deceptive ...

  6. Mobile location-based advertising: how information privacy concerns influence consumers' attitude and acceptance

    NARCIS (Netherlands)

    Limpf, N.; Voorveld, H.A.M.

    2015-01-01

    This study investigates the effect of information privacy concerns on consumers' attitude toward and acceptance of mobile location-based advertising (LBA), and the moderating role of the type of mobile LBA, namely push versus pull. Using an online experiment (N = 224), it was found that consumers'

  7. 76 FR 31350 - Public Workshop; Privacy Compliance Basics and 2011 Developments

    Science.gov (United States)

    2011-05-31

    ... Privacy Act of 1974, as amended, the E-Government Act of 2002, Office of Management and Budget memoranda... telephone 703-235-0780; by facsimile 703-235-0442; or by e-mail at [email protected] . SUPPLEMENTARY INFORMATION... send an e-mail to [email protected] , with ``PRIVComplianceWorkshop'' in the subject line, and your full name...

  8. 76 FR 18145 - Privacy Act of 1974; New System of Records

    Science.gov (United States)

    2011-04-01

    ... to include final determinations; billing information to include payment delinquencies; case notes... delinquencies; and case notes. Information collected includes the individual's name, address, telephone number... outside USDA, and so have some impact on privacy of individuals, they are either necessary for carrying...

  9. 77 FR 65049 - Privacy Act; System of Records: Translator and Interpreter Records, State-37

    Science.gov (United States)

    2012-10-24

    ... DEPARTMENT OF STATE [Public Notice 8066] Privacy Act; System of Records: Translator and... an existing system of records, Translator and Interpreter Records, State-37, pursuant to the... INFORMATION: The Department of State proposes that the current system will retain the name ``Translator and...

  10. 76 FR 5603 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-02-01

    ... on social media sites. However, OPS is permitted to establish user names and passwords to form profiles and follow relevant government, media, and subject matter experts on social media sites in order... Available Social Media Monitoring and Situational Awareness Initiative System of Records AGENCY: Privacy...

  11. Number names and number understanding

    DEFF Research Database (Denmark)

    Ejersbo, Lisser Rye; Misfeldt, Morten

    2014-01-01

    This paper concerns the results from the first year of a three-year research project involving the relationship between Danish number names and their corresponding digits in the canonical base 10 system. The project aims to develop a system to help the students’ understanding of the base 10 syste...... the Danish number names are more complicated than in other languages. Keywords: A research project in grade 0 and 1th in a Danish school, Base-10 system, two-digit number names, semiotic, cognitive perspectives....

  12. The Wildlife Habitat Education Program: Moving from Contest Participation to Implementation

    Science.gov (United States)

    Allen, Kevin; Elmore, R. Dwayne; Harper, Craig

    2013-01-01

    Do members participating in the Wildlife Habitat Education Program (WHEP) apply knowledge gained by implementing wildlife management practices at the local level? 4-H members who participated in the National WHEP Contest from 2003-2005 and 2007-2011 completed an evaluation at the end of each contest. The evaluation asked participants if they…

  13. Exploring the Effects of Contest Mechanisms on Idea Shortlisting in an Open Idea Competition

    DEFF Research Database (Denmark)

    Merz, Alexander Benedikt; Seeber, Isabella; Maier, Ronald

    2016-01-01

    Picking the most promising from a multitude of crowd-generated ideas challenges organizations that employ open idea competitions. Hence, hosts of such contests often filter submitted ideas into shortlists to help juries selecting the winning ideas. While contest communities and rewards have been...

  14. Contestation and Continuity in Educational Reform: A Critical Study of Innovations in Environmental Education.

    Science.gov (United States)

    Robottom, Ian Morris

    Contestation can be defined as a process in which self-interested individuals and groups in a social organization cooperate, compete, and negotiate in a complex interaction aimed at solving social problems. This dissertation explores the notion of contestation in the field of environmental education. In the first part of the document a framework…

  15. Multi-Agent Programming Contest 2013: The Teams and the Design of Their Systems

    DEFF Research Database (Denmark)

    Ahlbrecht, Tobias; Bender-Saebelkampf, Christian; Brito, Maiquel

    2013-01-01

    Five teams participated in the Multi-Agent Programming Contest in 2013: All of them gained experience in 2012 already. In order to better understand which paradigms they used, which techniques they considered important and how much work they invested, the organisers of the contest compiled together...

  16. Developing Conceptions of Fair Contest Procedures and the Understanding of Skill and Luck.

    Science.gov (United States)

    Thorkildsen, Theresa A.; White-McNulty, Lisa

    2002-01-01

    Contrary to assumptions about aversive effects of competition on achievement motivation, in this study young people saw academic contests as fair. When participants completed structural interviews on fair ways to organize science contests and on differentiation of skill and luck, age-related trends in their conceptions of procedural justice were…

  17. Multitemporal Very High Resolution From Space: Outcome of the 2016 IEEE GRSS Data Fusion Contest

    NARCIS (Netherlands)

    Mou, L.; Zhu, X.; Vakalopoulou, M.; Karantzalos, K.; Paragios, N.; Saux, Le B.; Moser, G.; Tuia, D.

    2017-01-01

    In this paper, the scientific outcomes of the 2016 Data Fusion Contest organized by the Image Analysis and Data Fusion Technical Committee of the IEEE Geoscience and Remote Sensing Society are discussed. The 2016 Contest was an open topic competition based on a multitemporal and multimodal dataset,

  18. Multi-Agent Programming Contest 2011 - The Python-DTU Team

    DEFF Research Database (Denmark)

    Villadsen, Jørgen; Ettienne, Mikko Berggren; Vester, Steen

    We provide a brief description of the Python-DTU system, including the overall design, the tools and the algorithms that we plan to use in the agent contest.......We provide a brief description of the Python-DTU system, including the overall design, the tools and the algorithms that we plan to use in the agent contest....

  19. Multi-Agent Programming Contest 2016 – The Python-DTU Team

    DEFF Research Database (Denmark)

    Villadsen, Jørgen; Halkjær From, Andreas; Jacobi, Salvador

    2018-01-01

    We provide a detailed description of the Python-DTU system, including the overall system design and the tools used in the agent contest.......We provide a detailed description of the Python-DTU system, including the overall system design and the tools used in the agent contest....

  20. Multi-Agent Programming Contest 2012 - The Python-DTU Team

    DEFF Research Database (Denmark)

    Villadsen, Jørgen; Jensen, Andreas Schmidt; Ettienne, Mikko Berggren

    We provide a brief description of the Python-DTU system, including the overall design, the tools and the algorithms that we plan to use in the agent contest.......We provide a brief description of the Python-DTU system, including the overall design, the tools and the algorithms that we plan to use in the agent contest....

  1. The Structure-Agency Dialectic in Contested Science Spaces: "Do Earthworms Eat Apples?"

    Science.gov (United States)

    Kane, Justine M.

    2015-01-01

    Focusing on a group of African American third graders who attend a high-poverty urban school, I explore the structure-agency dialectic within contested spaces situated in a dialogically oriented science classroom. Contested spaces entail the moments in which the students challenge each other's and their teacher's science ideas and, in the process,…

  2. Hospital cannot be held liable for breach of patient's privacy.

    Science.gov (United States)

    1997-04-04

    The Minnesota Court of Appeals ruled that a law guaranteeing the confidentiality of a patient's medical records did not create a private cause of actions for damages when the patient's HIV was revealed. The plaintiff, known as [name removed], requested that his stepbrother not be told his HIV status. A relative gained access to his medical file while working at a medical center and disclosed [name removed]'s HIV status to his stepbrother. [name removed] sued the relative and the hospital. The district court ruled that he did not have a cause of action against the hospital and the Court of Appeals agreed. The State does not recognize claims for an invasion of privacy under the Minnesota Patients Bill of Rights.

  3. Asteroid named after CAS scientist

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    @@ An asteroid has been named after CAS astronomy historian XI Zezong with the approval of the International Minor Planet Nomenclature Committee (IMPNC), announced China's National Astronomical Observatories at CAS (NAOC) on 17 August.

  4. Dictionary of Minor Planet Names

    CERN Document Server

    Schmadel, Lutz D

    2007-01-01

    Dictionary of Minor Planet Names, Fifth Edition, is the official reference for the field of the IAU, which serves as the internationally recognised authority for assigning designations to celestial bodies and any surface features on them. The accelerating rate of the discovery of minor planets has not only made a new edition of this established compendium necessary but has also significantly altered its scope: this thoroughly revised edition concentrates on the approximately 10,000 minor planets that carry a name. It provides authoritative information about the basis for all names of minor planets. In addition to being of practical value for identification purposes, this collection provides a most interesting historical insight into the work of those astronomers who over two centuries vested their affinities in a rich and colorful variety of ingenious names, from heavenly goddesses to more prosaic constructions. The fifth edition serves as the primary reference, with plans for complementary booklets with newl...

  5. The differing privacy concerns regarding exchanging electronic medical records of internet users in Taiwan.

    Science.gov (United States)

    Hwang, Hsin-Ginn; Han, Hwai-En; Kuo, Kuang-Ming; Liu, Chung-Feng

    2012-12-01

    This study explores whether Internet users have different privacy concerns regarding the information contained in electronic medical records (EMRs) according to gender, age, occupation, education, and EMR awareness. Based on the Concern for Information Privacy (CFIP) scale developed by Smith and colleagues in 1996, we conducted an online survey using 15 items in four dimensions, namely, collection, unauthorized access, secondary use, and errors, to investigate Internet users' concerns regarding the privacy of EMRs under health information exchanges (HIE). We retrieved 213 valid questionnaires. The results indicate that the respondents had substantial privacy concerns regarding EMRs and their educational level and EMR awareness significantly influenced their privacy concerns regarding unauthorized access and secondary use of EMRs. This study recommends that the Taiwanese government organizes a comprehensive EMR awareness campaign, emphasizing unauthorized access and secondary use of EMRs. Additionally, to cultivate the public's understanding of EMRs, the government should employ various media, especially Internet channels, to promote EMR awareness, thereby enabling the public to accept the concept and use of EMRs. People who are highly educated and have superior EMR awareness should be given a comprehensive explanation of how hospitals protect patients' EMRs from unauthorized access and secondary use to address their concerns. Thus, the public can comprehend, trust, and accept the use of EMRs, reducing their privacy concerns, which should facilitate the future implementation of HIE.

  6. CERN craftsman named Best in France

    CERN Multimedia

    Laurent Guiraud

    2001-01-01

    Didier Lombard, metal worker in EST Division, was crowned 'France's Top Craftsman' during the 21st edition of the contest, which covered the period 1997 to 2000. CERN employs some of Europe's top crafts people to work on construction of components for experiments that are designed to a high degree of precision.

  7. HIV cure research community engagement in North Carolina: a mixed-methods evaluation of a crowdsourcing contest.

    Science.gov (United States)

    Mathews, Allison; Farley, Samantha; Blumberg, Meredith; Knight, Kimberley; Hightow-Weidman, Lisa; Muessig, Kate; Rennie, Stuart; Tucker, Joseph

    2017-10-01

    The purpose of this study was to evaluate the feasibility of using a crowdsourcing contest to promote HIV cure research community engagement. Crowdsourcing contests are open calls for community participation to achieve a task, in this case to engage local communities about HIV cure research. Our contest solicited images and videos of what HIV cure meant to people. Contestants submitted entries to IdeaScale, an encrypted online contest platform. We used a mixed-methods study design to evaluate the contest. Engagement was assessed through attendance at promotional events and social media user analytics. Google Analytics measured contest website user-engagement statistics. Text from contest video entries was transcribed, coded and analysed using MAXQDA. There were 144 attendees at three promotional events and 32 entries from 39 contestants. Most individuals who submitted entries were black ( n =31), had some college education ( n =18) and were aged 18-23 years ( n =23). Social media analytics showed 684 unique page followers, 2233 unique page visits, 585 unique video views and an overall reach of 80,624 unique users. Contest submissions covered themes related to the community's role in shaping the future of HIV cure through education, social justice, creativity and stigma reduction. Crowdsourcing contests are feasible for engaging community members in HIV cure research. Community contributions to crowdsourcing contests provide useful content for culturally relevant and locally responsive research engagement.

  8. Elemental Etymology: What's in a Name?

    Science.gov (United States)

    Ball, David W.

    1985-01-01

    Examines the origin of the names (or etymologies) of the chemical elements. Includes tables listing elements: (1) with names of obscure origin; (2) named for colors; (3) named after real or mythical people; (4) named after places; (5) named after heavenly bodies; and (6) having names of miscellaneous origin. (JN)

  9. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  10. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  11. 16 CFR 313.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  12. 12 CFR 716.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  13. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  14. 32 CFR 701.101 - Privacy program terms and definitions.

    Science.gov (United States)

    2010-07-01

    ... from a project on privacy issues, identifying and resolving the privacy risks, and approval by a... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy program terms and definitions. 701.101... DEPARTMENT OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.101 Privacy program terms and...

  15. Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

    Directory of Open Access Journals (Sweden)

    Yujia Liu

    2017-01-01

    Full Text Available Online image sharing in social platforms can lead to undesired privacy disclosure. For example, some enterprises may detect these large volumes of uploaded images to do users’ in-depth preference analysis for commercial purposes. And their technology might be today’s most powerful learning model, deep neural network (DNN. To just elude these automatic DNN detectors without affecting visual quality of human eyes, we design and implement a novel Stealth algorithm, which makes the automatic detector blind to the existence of objects in an image, by crafting a kind of adversarial examples. It is just like all objects disappear after wearing an “invisible cloak” from the view of the detector. Then we evaluate the effectiveness of Stealth algorithm through our newly defined measurement, named privacy insurance. The results indicate that our scheme has considerable success rate to guarantee privacy compared with other methods, such as mosaic, blur, and noise. Better still, Stealth algorithm has the smallest impact on image visual quality. Meanwhile, we set a user adjustable parameter called cloak thickness for regulating the perturbation intensity. Furthermore, we find that the processed images have transferability property; that is, the adversarial images generated for one particular DNN will influence the others as well.

  16. Naming analog clocks conceptually facilitates naming digital clocks

    NARCIS (Netherlands)

    Meeuwissen, M.H.W.; Roelofs, A.P.A.; Levelt, W.J.M.

    2004-01-01

    Naming digital clocks (e.g., 2:45, say "quarter to three") requires conceptual operations on the minute and hour information displayed in the input for producing the correct relative time expression. The interplay of these conceptual operations was investigated using a repetition priming paradigm.

  17. Privacy, who cares?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    In mid-April, the Sony “Playstation” and “Online Entertainment” networks were compromised and the records of nearly 100 million(!) users (names, addresses, dates of birth, e-mail addresses) were stolen. It even seems that the credit card numbers of these users where lost, too.   In a different case, a bug in the job portal of UNESCO allowed any applicant to access addresses, mobile phone numbers and salaries of probably hundreds of thousands of other job seekers dating back to 2006. But data loss is not only an accidental or malicious act: Apple’s iPhone and iPads (and to a lesser extent Android devices) store each position location of their owners since 2008, and it is yet unclear whether this data made it back into Apple’s headquarters. Facebook and Google are already known to harvest gazillions of records of user data with the aim of pin-pointing customer behaviour. It is not the first time that, before committing a crime, thieves have c...

  18. Weighing both sides: morality, mortality, and framing contests over obesity.

    Science.gov (United States)

    Saguy, Abigail C; Riley, Kevin W

    2005-10-01

    Despite recent and growing media attention surrounding obesity in the United States, the so-called obesity epidemic remains a highly contested scientific and social fact. This article examines the contemporary obesity debate through systematic examination of the claims and claimants involved in the controversy. We argue that four primary groups-antiobesity researchers, antiobesity activists, fat acceptance researchers, and fat acceptance activists-are at the forefront of this controversy and that these groups are fundamentally engaged in framing contests over the nature and consequences of excess body weight. While members of the fat acceptance groups embrace a body diversity frame, presenting fatness as a natural and largely inevitable form of diversity, members of the antiobesity camp frame higher weights as risky behavior akin to smoking, implying that body weight is under personal control and that people have a moral and medical responsibility to manage their weight. Both groups sometimes frame obesity as an illness, which limits blame by suggesting that weight is biologically or genetically determined but simultaneously stigmatizes fat bodies as diseased. While the antiobesity camp frames obesity as an epidemic to increase public attention, fat acceptance activists argue that concern over obesity is distracting attention from a host of more important health issues for fat Americans. We examine the strategies claimants use to establish their own credibility or discredit their opponents, and explain how the fat acceptance movement has exploited structural opportunities and cultural resources created by AIDS activism and feminism to wield some influence over U.S. public health approaches. We conclude that notions of morality play a central role in the controversy over obesity, as in many medical disputes, and illustrate how medical arguments about body weight can be used to stymie rights claims and justify morality-based fears.

  19. Privacy Protection: Mandating New Arrangements to Implement and Assess Federal Privacy Policy and Practice

    National Research Council Canada - National Science Library

    Relyea, Harold C

    2004-01-01

    When Congress enacted the Privacy Act of 1974, it established a temporary national study commission to conduct a comprehensive assessment of privacy policy and practice in both the public and private...

  20. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  1. Trust and Privacy in Healthcare

    Science.gov (United States)

    Singleton, Peter; Kalra, Dipak

    This paper considers issues of trust and privacy in healthcare around increased data-sharing through Electronic Health Records (EHRs). It uses a model structured around different aspects of trust in the healthcare organisation’s reasons for greater data-sharing and their ability to execute EHR projects, particularly any associated confidentiality controls. It reflects the individual’s personal circumstances and attitude to use of health records.

  2. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  3. Fictional privacy among Facebook users.

    Science.gov (United States)

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  4. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  5. Online Tracking Technologies and Web Privacy:Technologieën voor Online volgen en Web Privacy

    OpenAIRE

    Acar, Mustafa Gunes Can

    2017-01-01

    In my PhD thesis, I would like to study the problem of online privacy with a focus on Web and mobile applications. Key research questions to be addressed by my study are the following: How can we formalize and quantify web tracking? What are the threats presented against privacy by different tracking techniques such as browser fingerprinting and cookie based tracking? What kind of privacy enhancing technologies (PET) can be used to ensure privacy without degrading service quality? The stud...

  6. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    Science.gov (United States)

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  7. Portrait of a Privacy Invasion

    Directory of Open Access Journals (Sweden)

    Shoshitaishvili Yan

    2015-04-01

    Full Text Available The popularity of online social networks has changed the way in which we share personal thoughts, political views, and pictures. Pictures have a particularly important role in the privacy of users, as they can convey substantial information (e.g., a person was attending an event, or has met with another person. Moreover, because of the nature of social networks, it has become increasingly difficult to control who has access to which content. Therefore, when a substantial amount of pictures are accessible to one party, there is a very serious potential for violations of the privacy of users. In this paper, we demonstrate a novel technique that, given a large corpus of pictures shared on a social network, automatically determines who is dating whom, with reasonable precision. More specifically, our approach combines facial recognition, spatial analysis, and machine learning techniques to determine pairs that are dating. To the best of our knowledge, this is the first privacy attack of this kind performed on social networks. We implemented our approach in a tool, called Creepic, and evaluated it on two real-world datasets. The results show that it is possible to automatically extract non-obvious, and nondisclosed, relationships between people represented in a group of pictures, even when the people involved are not directly part of a connected social clique.

  8. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  9. Ethical Concerns of and Risk Mitigation Strategies for Crowdsourcing Contests and Innovation Challenges: Scoping Review

    Science.gov (United States)

    Pan, Stephen W; Mathews, Allison; Stein, Gabriella; Bayus, Barry; Rennie, Stuart

    2018-01-01

    Background Crowdsourcing contests (also called innovation challenges, innovation contests, and inducement prize contests) can be used to solicit multisectoral feedback on health programs and design public health campaigns. They consist of organizing a steering committee, soliciting contributions, engaging the community, judging contributions, recognizing a subset of contributors, and sharing with the community. Objective This scoping review describes crowdsourcing contests by stage, examines ethical problems at each stage, and proposes potential ways of mitigating risk. Methods Our analysis was anchored in the specific example of a crowdsourcing contest that our team organized to solicit videos promoting condom use in China. The purpose of this contest was to create compelling 1-min videos to promote condom use. We used a scoping review to examine the existing ethical literature on crowdsourcing to help identify and frame ethical concerns at each stage. Results Crowdsourcing has a group of individuals solve a problem and then share the solution with the public. Crowdsourcing contests provide an opportunity for community engagement at each stage: organizing, soliciting, promoting, judging, recognizing, and sharing. Crowdsourcing poses several ethical concerns: organizing—potential for excluding community voices; soliciting—potential for overly narrow participation; promoting—potential for divulging confidential information; judging—potential for biased evaluation; recognizing—potential for insufficient recognition of the finalist; and sharing—potential for the solution to not be implemented or widely disseminated. Conclusions Crowdsourcing contests can be effective and engaging public health tools but also introduce potential ethical problems. We present methods for the responsible conduct of crowdsourcing contests. PMID:29523500

  10. PRIVACY PROTECTION PROBLEMS IN SOCIAL NETWORKS

    OpenAIRE

    OKUR, M. Cudi

    2011-01-01

    Protecting privacy has become a major concern for most social network users because of increased difficulties of controlling the online data. This article presents an assessment of the common privacy related risks of social networking sites. Open and hidden privacy risks of active and passive online profiles are examined and increasing share of social networking in these phenomena is discussed. Inadequacy of available legal and institutional protection is demonstrated and the effectiveness of...

  11. Facebook: Personality and privacy on profiles

    OpenAIRE

    Casado Riera, Carla; Oberst, Ursula; Carbonell, Xavier

    2015-01-01

    The aim of this study was to study the possible relationship between the privacy settings in Facebook profiles and two personality dimensions, extraversion and neuroticism, in relation to gender. The Privacy on Facebook Questionnaire and the Eysenck Personality Inventory was applied to a sample of 92 womenand 70 men, all users of Facebook. No significant relationship was found between extraversion or neuroticism and the privacy settings of Facebook profiles, but the results showed significant...

  12. Toward sensitive document release with privacy guarantees

    OpenAIRE

    David Sánchez; Montserrat Batet

    2017-01-01

    Toward sensitive document release with privacy guarantees DOI: 10.1016/j.engappai.2016.12.013 URL: http://www.sciencedirect.com/science/article/pii/S0952197616302408 Filiació URV: SI Inclòs a la memòria: SI Privacy has become a serious concern for modern Information Societies. The sensitive nature of much of the data that are daily exchanged or released to untrusted parties requires that responsible organizations undertake appropriate privacy protection measures. Nowadays, much...

  13. An Alternative View of Privacy on Facebook

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2011-02-01

    Full Text Available The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy tends to ignore the political economy of privacy in capitalism that can mask socio-economic inequality and protect capital and the rich from public accountability. Facebook is in this paper analyzed with the help of an approach, in which privacy for dominant groups, in regard to the ability of keeping wealth and power secret from the public, is seen as problematic, whereas privacy at the bottom of the power pyramid for consumers and normal citizens is seen as a protection from dominant interests. Facebook’s privacy concept is based on an understanding that stresses self-regulation and on an individualistic understanding of privacy. The theoretical analysis of the political economy of privacy on Facebook in this paper is based on the political theories of Karl Marx, Hannah Arendt and Jürgen Habermas. Based on the political economist Dallas Smythe’s concept of audience commodification, the process of prosumer commodification on Facebook is analyzed. The political economy of privacy on Facebook is analyzed with the help of a theory of drives that is grounded in Herbert Marcuse’s interpretation of Sigmund Freud, which allows to analyze Facebook based on the concept of play labor (= the convergence of play and labor.

  14. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  15. A Model-Based Privacy Compliance Checker

    OpenAIRE

    Siani Pearson; Damien Allison

    2009-01-01

    Increasingly, e-business organisations are coming under pressure to be compliant to a range of privacy legislation, policies and best practice. There is a clear need for high-level management and administrators to be able to assess in a dynamic, customisable way the degree to which their enterprise complies with these. We outline a solution to this problem in the form of a model-driven automated privacy process analysis and configuration checking system. This system models privacy compliance ...

  16. Privacy Preservation in Distributed Subgradient Optimization Algorithms

    OpenAIRE

    Lou, Youcheng; Yu, Lean; Wang, Shouyang

    2015-01-01

    Privacy preservation is becoming an increasingly important issue in data mining and machine learning. In this paper, we consider the privacy preserving features of distributed subgradient optimization algorithms. We first show that a well-known distributed subgradient synchronous optimization algorithm, in which all agents make their optimization updates simultaneously at all times, is not privacy preserving in the sense that the malicious agent can learn other agents' subgradients asymptotic...

  17. Moving eyes and naming objects

    NARCIS (Netherlands)

    Meulen, F.F. van der

    2001-01-01

    The coordination between eye movements and speech was examined while speakers were naming objects. Earlier research has shown that eye movements reflect on the underlying visual attention. Also, eye movements were found to reflect upon not only the visual and conceptual processing of an object, but

  18. Can You Say My Name?

    DEFF Research Database (Denmark)

    Erz, Antonia; Christensen, Bo T.

    affect their judgments of people and objects. We extend this research by investigating the effect of phonological fluency on recognition and recall of novel non-word brand names in three laboratory experiments. The results provide us with a more fine-grained idea of fluency effects on memory of non...

  19. African names for American plants

    NARCIS (Netherlands)

    Andel, van T.R.

    2015-01-01

    African slaves brought plant knowledge to the New World, sometimes applying it to related plants they found there and sometimes bringing Old World plants with them. By tracing the linguistic parallels between names for plants in African languages and in communities descended from African slaves,

  20. Academy named after newsreader's wife.

    Science.gov (United States)

    2010-06-24

    AN ADMIRAL nurse academy named in honour of Bonnie Suchet, the wife of former newsreader John Suchet, has opened. The 'virtual' academy, set up by charity dementia UK, Canterbury Christ Church University and the Avante Partnership, will provide continuing professional development and a networking environment for n nurses through its website. Ms Suchet has Alzheimer's disease and is in a care home.

  1. Negotiating privacy in surveillant welfare relations

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Lauritsen, Peter; Bøge, Ask Risom

    . However, while privacy is central to debates of surveillance, it has proven less productive as an analytical resource for studying surveillance in practice. Consequently, this paper reviews different conceptualisations of privacy in relation to welfare and surveillance and argues for strengthening...... the analytical capacity of the concept by rendering it a situated and relational concept. The argument is developed through a research and design project called Teledialogue meant to improve the relation between case managers and children placed at institutions or in foster families. Privacy in Teledialogue...... notion of privacy are discussed in relation to both research- and public debates on surveillance in a welfare setting....

  2. Privacy Protection Research of Mobile RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Radio Frequency Identification is one of the most controversial technologies at present.It is very difficult to detect who reads a tag incorporated into products owned by a person,a significant concern to privacy threats in RFID system arises from this reason.User privacy problem is prior considersion for mobile RFID service,because most mobile RFID service based on end-user service.Propose a solution for user privacy protection,which is a modification of EPC Class 1 Generation 2 protocol,and introduce a privacy protection scenario for mobile RFID service using this method.

  3. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  4. Customer privacy on UK healthcare websites.

    Science.gov (United States)

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  5. Extending SQL to Support Privacy Policies

    Science.gov (United States)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  6. Toward Privacy-Preserving Personalized Recommendation Services

    Directory of Open Access Journals (Sweden)

    Cong Wang

    2018-02-01

    Full Text Available Recommendation systems are crucially important for the delivery of personalized services to users. With personalized recommendation services, users can enjoy a variety of targeted recommendations such as movies, books, ads, restaurants, and more. In addition, personalized recommendation services have become extremely effective revenue drivers for online business. Despite the great benefits, deploying personalized recommendation services typically requires the collection of users’ personal data for processing and analytics, which undesirably makes users susceptible to serious privacy violation issues. Therefore, it is of paramount importance to develop practical privacy-preserving techniques to maintain the intelligence of personalized recommendation services while respecting user privacy. In this paper, we provide a comprehensive survey of the literature related to personalized recommendation services with privacy protection. We present the general architecture of personalized recommendation systems, the privacy issues therein, and existing works that focus on privacy-preserving personalized recommendation services. We classify the existing works according to their underlying techniques for personalized recommendation and privacy protection, and thoroughly discuss and compare their merits and demerits, especially in terms of privacy and recommendation accuracy. We also identity some future research directions. Keywords: Privacy protection, Personalized recommendation services, Targeted delivery, Collaborative filtering, Machine learning

  7. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  8. Local newspaper movie contests and the creation of the first movie fans

    Directory of Open Access Journals (Sweden)

    Jessica Leonora Whitehead

    2016-09-01

    Full Text Available This article explores the advent of local newspaper movie contests in the 1910s and how these contests helped to create active movie fans. Such contests increased the popularity of the new medium of film by engaging local audiences in the process of filmmaking, including fans as scriptwriters and even stars. They helped to transform film into a dominant cultural practice by creating local spaces for film patrons to become part of the national pastime of going to the show. They did so by appealing directly to female spectators, who both legitimized going to the movies and created dynamic film fan communities.

  9. Naming names: the first women taxonomists in mycology

    Directory of Open Access Journals (Sweden)

    Sara Maroske

    2018-03-01

    Full Text Available The transition from amateur to professional in natural history is generally regarded as having taken place in the nineteenth century, but landmark events such as the 1917 appointment of mycologist Johanna Westerdijk (1883–1961 as the first female professor in the Netherlands indicate that the pattern of change for women was more varied and delayed than for men. We investigate this transition in mycology, and identify only 43 women in the Western World who published scientific mycological literature pre-1900, of whom twelve published new fungal taxa. By charting the emergence of these women over time, and comparing the output of self-taught amateurs and university graduates, we establish the key role of access to higher education in female participation in mycology. Using a suite of strategies, six of the self-taught amateurs managed to overcome their educational disadvantages and name names — Catharina Dörrien (the first to name a fungal taxon, Marie-Anne Libert, Mary Elizabeth Banning, Élise-Caroline Bommer, Mariette Rousseau, and Annie Lorrain Smith. By 1900, the professional era for women in mycology was underway, and increasing numbers published new taxa. Parity with male colleagues in recognition and promotion, however, remains an ongoing issue. Key words: Amateurs, Fungi, Gender studies, History of science, Plant pathology

  10. Privacy Is Become with, Data Perturbation

    Science.gov (United States)

    Singh, Er. Niranjan; Singhai, Niky

    2011-06-01

    Privacy is becoming an increasingly important issue in many data mining applications that deal with health care, security, finance, behavior and other types of sensitive data. Is particularly becoming important in counterterrorism and homeland security-related applications. We touch upon several techniques of masking the data, namely random distortion, including the uniform and Gaussian noise, applied to the data in order to protect it. These perturbation schemes are equivalent to additive perturbation after the logarithmic Transformation. Due to the large volume of research in deriving private information from the additive noise perturbed data, the security of these perturbation schemes is questionable Many artificial intelligence and statistical methods exist for data analysis interpretation, Identifying and measuring the interestingness of patterns and rules discovered, or to be discovered is essential for the evaluation of the mined knowledge and the KDD process as a whole. While some concrete measurements exist, assessing the interestingness of discovered knowledge is still an important research issue. As the tool for the algorithm implementations we chose the language of choice in industrial world MATLAB.

  11. Wisdom of the Crowds: Crowd-Based Development of a Logo for a Conference Using a Crowdsourcing Contest.

    Science.gov (United States)

    Ong, Jason J; Bilardi, Jade E; Tucker, Joseph D

    2017-10-01

    Crowdsourcing methods have been widely used in business, but rarely in sexual health research. We evaluated a crowdsourced logo contest as part of an international human immunodeficiency virus conference. A logo crowdsourcing contest was conducted for the 20th International Acquired Immunodeficiency Syndrome Conference. Crowdsourcing has a group of individuals solve a task, often as part of an open contest. Semistructured interviews were conducted with key informants including contest organizers, contest contributors, and conference attendees. Interviews were transcribed verbatim and analysed using a content analysis approach. In total, 22 interviews were conducted with 3 contest organizers, 7 contest contributors, and 12 conference attendees. All individuals reported that the crowdsourced logo provided benefits beyond branding the conference, including creating a shared sense of purpose among diverse conference participants and explicitly demonstrating the strong community orientation of the conference. Conference organizers and attendees all reported deeper engagement because of the story of the Tanzanian artist who won the contest. Most conference attendees (11/12) preferred the crowdsourced logo compared with the previous company-organized logo, and all (22/22) supported the logo contest continuing. Implementing a logo contest was simple and relatively inexpensive. Stakeholders identified several ways to enhance crowdsourcing logo contest methods including wider promotion of the contest to encourage broader participation, greater transparency in the selection process, and a different prize structure which acknowledges the contribution of more contestants. We found that a crowdsourcing contest helped engage local and global communities in the lead-up before and during an international conference. Similar participatory events may be useful for sexual health conferences and research projects.

  12. Digital privacy in the marketplace perspectives on the information exchange

    CERN Document Server

    Milne, George

    2015-01-01

    Digital Privacy in the Marketplace focuses on the data ex-changes between marketers and consumers, with special ttention to the privacy challenges that are brought about by new information technologies. The purpose of this book is to provide a background source to help the reader think more deeply about the impact of privacy issues on both consumers and marketers. It covers topics such as: why privacy is needed, the technological, historical and academic theories of privacy, how market exchange af-fects privacy, what are the privacy harms and protections available, and what is the likely future of privacy.

  13. The War Against Terror and Transatlantic Information Sharing: Spillovers of Privacy or Spillovers of Security?

    Directory of Open Access Journals (Sweden)

    Maria Tzanou

    2015-02-01

    Full Text Available The EU-US Passenger Name Record (PNR agreement has been among the most controversial instruments in the fight against terrorism that the EU negotiated with the US after the 9/11 terrorist attacks. The agreement has been heavily criticised for its implications regarding fundamental rights, in particular the rights to privacy and data protection. Nevertheless, the EU has put forward plans to develop its own PNR programme. The present article aims to examine the new dynamics concerning privacy that arise from the transatlantic fight against terrorism. It argues that, while attempts for the development of a transatlantic privacy protection framework have been made, ‘spillovers’ of security, taking the form of internalisation of external counter-terrorism measures, are prevalent in the era of the war against terror.

  14. Zefinha - the name of abandonment.

    Science.gov (United States)

    Diniz, Debora

    2015-09-01

    Zefinha has been living in a forensic hospital for the last 39 years. She is the longest female inhabitant surviving under compulsory psychiatric treatment in Brazil. This paper discusses how the ethical rule of anonymity might be revised in research concerning a unique case involving severe violations of human rights. My argument is that there are cases in which disclosing the names of research participants protects their interests and rights.

  15. People's practices : exploring contestation, counter-development, and rural livelihoods : ...cases from Muktinagar, Bangladesh

    NARCIS (Netherlands)

    Huq, H.

    2000-01-01

    People's Practices: Exploring contestation, Counter - development, and rural livelihoods

    The central problems explored in the thesis concern the vulnerability of disadvantaged local people, especially women, and their agency; development discourses and counter-development

  16. Regulation as a political contest: the probability of conservation of a renewable resource

    DEFF Research Database (Denmark)

    Brandt, Urs Steiner

    2017-01-01

    How do the levels of extreme positions of various interest groups influence the conservation policies in the context of a renewable resource conservation contest? To answer this question, a model is provided where conservation policy is determined as a contest between two opposing interest groups......: one in favor of conservation and another in favor of non-conservation. The levels of extreme positions for the conservationalists are determined by their demands about the severity of the conservation strategy that needs to be implemented. For the non-conservation group, the level of extreme position...... is determined by how large the current harvest of the resource should be. The main driver of the model is that resource conservation is realized only if the conservation group wins the contest, which again depends on the relative gain the two contenders receive when winning the contest. The paper derives...

  17. 2011 IEEE Visualization Contest Winner: Visualizing Unsteady Vortical Behavior of a Centrifugal Pump

    KAUST Repository

    Otto, Mathias; Kuhn, Alexander; Engelke, Wito; Theisel, Holger

    2012-01-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall

  18. Contested environmental policy infrastructure: socio-political acceptance of renewable energy, water, and waste facilities

    NARCIS (Netherlands)

    Wolsink, M.

    2010-01-01

    The construction of new infrastructure is hotly contested. This paper presents a comparative study on three environmental policy domains in the Netherlands that all deal with legitimising building and locating infrastructure facilities. Such infrastructure is usually declared essential to

  19. Re-Packaging FPIC: Contesting the Shape of Corporate Responsability,Sate Authority, and Indigenous Governance

    Directory of Open Access Journals (Sweden)

    David Szablowski

    2010-12-01

    Full Text Available In this paper, I propose to examine how rival global governmentalprojects are asserted and contested by decentralized networks thatlink actors operating at different scales. I argue that Tsing’s notionof «travelling packages» provides a useful way of conceptualizingthe means by which elements of these projects are diffused, translated,taken up, and adapted into different localities around theworld. I explore these dynamics in relation to the contestation of agovernance model based on the principle that the free, prior andinformed consent (FPIC of an indigenous people is required toauthorize actions that may affect upon indigenous territory or indigenousrights. Through the assertion of different versions of FPIC,networked actors are contesting the nature and shape of corporatesocial responsibility, the authority of the state, and the significanceof indigenous governance. I propose to explore the implicationsof different packaging strategies on the contestation between rivalgovernance models and on their propensity for uptake in local sites.

  20. Martin Luther King Jr. contest winning posters to be displayed in downtown Blacksburg

    OpenAIRE

    Shannon, Kelly Baker

    2010-01-01

    Each year as part of the Martin Luther King Jr. celebration at Virginia Tech area kindergarten through 12th grade students are invited to participate in the annual Martin Luther King Jr. poster contest.

  1. Means of Evidence and Evidence Collection in Contested Procedure in Kosovo

    Directory of Open Access Journals (Sweden)

    Mr.Sc. Makfirete Krasniqi

    2015-12-01

    Full Text Available The purpose of this paper is to serve as a helpful tool for students, jurists, lawyers, judges and others, in the profesional and scientific aspect. In ruling a contested procedure in a professional manner, the court has to find the truth, so that the contested procedure is most efficient until reaching the final verdict. In my research, I intend to enrich the science with my knowledge in the field of contested procedure. In this study I have used analytical, comparative, synthesis, generalization and other methods. Those reading this paper will understand how evidence is the most important part in a fair trial, since failure to prove claims very often leads towards an incorrect situation; they will understand how difficult and painful would be forfeiting rights for the litigating party, which would lead to serious changes, such as losing property, losing a job, compensation of personal income, compensation for damage caused. The paper in itself contains deposited evidence, which maintain the level of estimation from the court in order to make a judgment in a contested procedure with a court verdict. In this paper I present the subject of: “Means of evidence and evidence collection in contested procedure”, where I have tried to research the theory but also the practice in contested proceedings, addressing the positive aspects, the deficiencies and novelties. In the legal provisions of the Law on Contested Procedure of theRepublicofKosovo, no. 03/L-006, of 30 June 2008, and Law no. 04/L-118, of 13 September 2012, on amendments to the Law on Contested Procedure, evidentiary means and evidence collection are included in chapter XXII.

  2. 1993 Technical Paper Contest for Women. Gear Up 2000: Women in Motion

    Science.gov (United States)

    Orans, Robin (Editor); Duckett, Sophie (Editor); White, Susan (Editor)

    1994-01-01

    The NASA Ames Research Center Advisory Committee for Women (ACW) sponsored the second ACW Technical paper Contest for Ames women in order to increase the visibility of, and to encourage writing for publication by Ames women scientists, engineers, and technicians. The topics of the contest paper mirrored in the topics of the 1993 Society for Women Engineers (SWE) National Convention, which included technological, workplace, global, and family issues.

  3. Does popularity matter in a TV song competition? Evidence from a national music contest

    OpenAIRE

    Budzinski, Oliver; Pannicke, Julia

    2017-01-01

    There is a considerable amount of literature analyzing factors of success in music contests, in particular those where the audience votes for the winner. However, one factor that is highlighted by the economic theory of stardom is generally neglected in the literature. In this paper, we tackle this research gap by focusing on a national music contest in Germany and investigating how popularity of the participating artists influences the final voting results. We employ two different concepts o...

  4. Working Paper 172 - Political Economy of Service Delivery: Monitoring versus Contestation

    OpenAIRE

    Kjell Hausken; Mthuli Ncube

    2013-01-01

    Many communities suffer limited public goods provision due to civil servants (doctors, teachers, etc) supplementing their low income with moonlighting activities. Monitors of civil servants commonly also earn low salaries from monitoring and may prefer political contestation for power and prestige. We determine an internal equilibrium for how monitors strike a balance between monitoring and political contestation. We also determine a corner solution where an unresourceful monitor does not mon...

  5. Globalized conflicts, globalized responses. Changing manners of contestation among indigenous communities

    DEFF Research Database (Denmark)

    Benyei, Petra; Turreira Garcia, Nerea; Orta-Martínez, Martí

    2017-01-01

    In a globalized world, environmental conflicts affecting indigenous communities (including hunter-gatherer groups) have intensified and grown in their transnational character. These changes have affected the choice of manners of contestation of these groups, favouring in some cases the emergence...... activities and confront conflicts through a truly bottom-up approach. The chapter ends discussing how, despite the potential of such new manners of contestation, the power imbalances that currently underpin many indigenous conflicts are first to be addressed....

  6. Boundary Struggles : Contestations of Free Speech in the Norwegian Publis Sphere

    OpenAIRE

    2017-01-01

    Freedom of speech is a fundamental human right and a core value in liberal democracies. It is also, however, one of our time’s most contested issues, constantly claimed to be either too wide-ranging, at the peril of vulnerable minority groups, or too limited, restricting dissent and democratic deliberation. Employing a sociological lens on the dynamics of the public sphere, this book investigates how the boundaries of free speech are contested and negotiated through social processes which sil...

  7. Contested Norms in the Process of EU Enlargement: Non-Discrimination and Minority Rights

    OpenAIRE

    Antje Wiener; Guido Schwellnus

    2004-01-01

    This paper analyses the adoption of EU conditions regarding non-discrimination and minority protection in three applicant countries: Romania, Hungary and Poland. While non-discrimination is a well established EU norm, minority rights are a contested norm and not enshrined in the acquis communautaire. It is argued that contestation over norm meaning highlights the importance of norm resonance and domestic norm construction in processes of norm diffusion, and that the conceptual tension between...

  8. Privacy and Psychosomatic Stress: An Empirical Analysis.

    Science.gov (United States)

    Webb, Stephen D.

    1978-01-01

    Examines the supposition that insufficient privacy is stressful to the individual. Data were obtained from urban centers in New Zealand. Findings support the hypothesis that a percieved lack of privacy is associated with psychosomatic stress. The relationship is specified by measures of stress and sex of respondents. (Author)

  9. 76 FR 51869 - Privacy Act Implementation

    Science.gov (United States)

    2011-08-19

    ... permanent residence. Maintain includes collect, use, disseminate, or control. Privacy Act means the Privacy... announces the creation, deletion, or amendment of one or more system of records. System of records notices... reference and university libraries or electronically at the [[Page 51873

  10. Just in Time Research: Privacy Practices

    Science.gov (United States)

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  11. Differential privacy in intelligent transportation systems

    NARCIS (Netherlands)

    Kargl, Frank; Friedman, Arik; Boreli, Roksana

    2013-01-01

    In this paper, we investigate how the concept of differential privacy can be applied to Intelligent Transportation Systems (ITS), focusing on protection of Floating Car Data (FCD) stored and processed in central Traffic Data Centers (TDC). We illustrate an integration of differential privacy with

  12. Online privacy: overview and preliminary research

    Directory of Open Access Journals (Sweden)

    Renata Mekovec

    2010-12-01

    Full Text Available Normal 0 21 false false false HR X-NONE X-NONE MicrosoftInternetExplorer4 Over the last decade using the Internet for online shopping, information browsing and searching as well as for online communication has become part of everyday life. Although the Internet technology has a lot of benefits for users, one of the most important disadvantages is related to the increasing capacity for users’ online activity surveillance. However, the users are increasingly becoming aware of online surveillance methods, which results in their increased concern for privacy protection. Numerous factors influence the way in which individuals perceive the level of privacy protection when they are online. This article provides a review of factors that influence the privacy perception of Internet users. Previous online privacy research related to e-business was predominantly focused on the dimension of information privacy and concerned with the way users’ personal information is collected, saved and used by an online company. This article’s main aim is to provide an overview of numerous Internet users’ privacy perception elements across various privacy dimensions as well as their potential categorization. In addition, considering that e-banking and online shopping are one of the most widely used e-services, an examination of online privacy perception of e-banking/online shopping users was performed. 

  13. Privacy een grondrecht, maar ook handelswaar

    NARCIS (Netherlands)

    Olsthoorn, P.

    2015-01-01

    Snoeihard uit journalist Brenno de Winter zijn commentaar op sprekers over privacy tijdens het NLIGF congres 2015. Hij zet Bart Schermer, adviseur van bedrijven en organisaties in de hoek. Die heeft net betoogd dat privacy geen juk (‘korvee’) mag vormen maar inzet moet zijn van innovatie door

  14. Revocable privacy: Principles, use cases, and technologies

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Security and privacy often seem to be at odds with one another. In this paper, we revisit the design principle of revocable privacy which guides the creation of systems that offer anonymity for people who do not violate a predefined rule, but can still have consequences for people who do violate the

  15. Privacy-Preserving Location-Based Services

    Science.gov (United States)

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  16. Privacy and Ethics in Undergraduate GIS Curricula

    Science.gov (United States)

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  17. Towards quantum-based privacy and voting

    International Nuclear Information System (INIS)

    Hillery, Mark; Ziman, Mario; Buzek, Vladimir; Bielikova, Martina

    2006-01-01

    The privacy of communicating participants is often of paramount importance, but in some situations it is an essential condition. A typical example is a fair (secret) voting. We analyze in detail communication privacy based on quantum resources, and we propose new quantum protocols. Possible generalizations that would lead to voting schemes are discussed

  18. Contemporary Privacy Theory Contributions to Learning Analytics

    Science.gov (United States)

    Heath, Jennifer

    2014-01-01

    With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems…

  19. Privacy-preserving digital rights management

    NARCIS (Netherlands)

    Conrado, C.; Petkovic, M.; Jonker, W.; Jonker, W.; Petkovic, M.

    2004-01-01

    DRM systems provide a means for protecting digital content, but at the same time they violate the privacy of users in a number of ways. This paper addresses privacy issues in DRM systems. The main challenge is how to allow a user to interact with the system in an anonymous/pseudonymous way, while

  20. Measuring privacy compliance using fitness metrics

    NARCIS (Netherlands)

    Banescu, S.; Petkovic, M.; Zannone, N.; Barros, A.; Gal, A.; Kindler, E.

    2012-01-01

    Nowadays, repurposing of personal data is a major privacy issue. Detection of data repurposing requires posteriori mechanisms able to determine how data have been processed. However, current a posteriori solutions for privacy compliance are often manual, leading infringements to remain undetected.

  1. Security of electronic medical information and patient privacy: what you need to know.

    Science.gov (United States)

    Andriole, Katherine P

    2014-12-01

    The responsibility that physicians have to protect their patients from harm extends to protecting the privacy and confidentiality of patient health information including that contained within radiological images. The intent of HIPAA and subsequent HIPAA Privacy and Security Rules is to keep patients' private information confidential while allowing providers access to and maintaining the integrity of relevant information needed to provide care. Failure to comply with electronic protected health information (ePHI) regulations could result in financial or criminal penalties or both. Protected health information refers to anything that can reasonably be used to identify a patient (eg, name, age, date of birth, social security number, radiology examination accession number). The basic tools and techniques used to maintain medical information security and patient privacy described in this article include physical safeguards such as computer device isolation and data backup, technical safeguards such as firewalls and secure transmission modes, and administrative safeguards including documentation of security policies, training of staff, and audit tracking through system logs. Other important concepts related to privacy and security are explained, including user authentication, authorization, availability, confidentiality, data integrity, and nonrepudiation. Patient privacy and security of medical information are critical elements in today's electronic health care environment. Radiology has led the way in adopting digital systems to make possible the availability of medical information anywhere anytime, and in identifying and working to eliminate any risks to patients. Copyright © 2014 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  2. Can the obstacles to privacy self-management be overcome? Exploring the consent intermediary approach

    Directory of Open Access Journals (Sweden)

    Tuukka Lehtiniemi

    2017-07-01

    Full Text Available In privacy self-management, people are expected to perform cost–benefit analysis on the use of their personal data, and only consent when their subjective benefits outweigh the costs. However, the ubiquitous collection of personal data and Big Data analytics present increasing challenges to successful privacy management. A number of services and research initiatives have proposed similar solutions to provide people with more control over their data by consolidating consent decisions under a single interface. We have named this the ‘ consent intermediary ’ approach. In this paper, we first identify the eight obstacles to privacy self-management which make cost–benefit analysis conceptually and practically challenging. We then analyse to which extent consent intermediaries can help overcome the obstacles. We argue that simply bringing consent decisions under one interface offers limited help, but that the potential of this approach lies in leveraging the intermediary position to provide aides for privacy management. We find that with suitable tools, some of the more practical obstacles indeed can become solvable, while others remain fundamentally insuperable within the individuated privacy self-management model. Attention should also be paid to how the consent intermediaries may take advantage of the power vested in the intermediary positions between users and other services.

  3. Protecting privacy in data release

    CERN Document Server

    Livraga, Giovanni

    2015-01-01

    This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsou

  4. Enforcing Privacy in Cloud Databases

    OpenAIRE

    Moghadam, Somayeh Sobati; Darmont, Jérôme; Gavin, Gérald

    2017-01-01

    International audience; Outsourcing databases, i.e., resorting to Database-as-a-Service (DBaaS), is nowadays a popular choice due to the elasticity, availability, scalability and pay-as-you-go features of cloud computing. However, most data are sensitive to some extent, and data privacy remains one of the top concerns to DBaaS users, for obvious legal and competitive reasons.In this paper, we survey the mechanisms that aim at making databases secure in a cloud environment, and discuss current...

  5. VLT Unit Telescopes Named at Paranal Inauguration

    Science.gov (United States)

    1999-03-01

    General, speeches were delivered by the President of the ESO Council and the President of Chile. The speakers praised the great achievement of bringing the very complex, high-technology VLT project this far so successfully and also the wonderful new opportunities for front-line research with this new facility. This would not have been possible without excellent cooperation between the many parties to this project, individuals as well as research institutes, companies and governments, all working towards a common goal. The ceremony was concluded with a discourse on "Understanding the Universe" by Physics Nobel Prize winner, Professor Carlo Rubbia, former Director of CERN. At the end of the day, the President of the ESO Council, the ESO Director General and the Heads of Delegations had the opportunity to witness an observing session with the UT1 from the VLT Control Room. The 300 other guests followed this event via internal video broadcast. Mapuche names for the Unit Telescopes It had long been ESO's intention to provide "real" names to the four VLT Unit Telescopes, to replace the current, somewhat dry and technical designations as UT1 to UT4. Four meaningful names of objects in the sky in the Mapuche language were chosen. This indigeneous people lives mostly in the area south of Santiago de Chile. An essay contest was arranged in this connection among schoolchildren of the Chilean II Region of which Antofagasta is the capital to write about the implications of these names. It drew many excellent entries dealing with the rich cultural heritage of ESO's host country. The jury was unanimous in its choice of the winning essay. This was submitted by 17-year old Jorssy Albanez Castilla from Chuquicamata near the city of Calama. She received the prize, an amateur telescope, during the Paranal Inauguration. Henceforth, the four Unit Telescopes will be known as ANTU (UT1; pronounced an-too ; The Sun), KUEYEN (UT2; qua-yen , like in "quake"; The Moon), MELIPAL (UT3; me-li-pal ; The

  6. Interaction location outweighs the competitive advantage of numerical superiority in Cebus capucinus intergroup contests.

    Science.gov (United States)

    Crofoot, Margaret C; Gilby, Ian C; Wikelski, Martin C; Kays, Roland W

    2008-01-15

    Numerical superiority confers a competitive advantage during contests among animal groups, shaping patterns of resource access, and, by extension, fitness. However, relative group size does not always determine the winner of intergroup contests. Smaller, presumably weaker social groups often defeat their larger neighbors, but how and when they are able to do so remains poorly understood. Models of competition between individuals suggest that location may influence contest outcome. However, because of the logistical difficulties of studying intergroup interactions, previous studies have been unable to determine how contest location and group size interact to shape relationships among groups. We address this question by using an automated radio telemetry system to study intergroup interactions among six capuchin monkey (Cebus capucinus) social groups of varying sizes. We find that the odds of winning increase with relative group size; one additional group member increases the odds of winning an interaction by 10%. However, this effect is not uniform across space; with each 100 m that a group moves away from the center of its home range, its odds of winning an interaction decrease by 31%. We demonstrate that contest outcome depends on an interaction between group size and location, such that small groups can defeat much larger groups near the center of their home range. The tendency of resident groups to win contests may help explain how small groups persist in areas with intense intergroup competition.

  7. Protecting privacy in a clinical data warehouse.

    Science.gov (United States)

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.

  8. Efficient Dynamic Searchable Encryption with Forward Privacy

    Directory of Open Access Journals (Sweden)

    Etemad Mohammad

    2018-01-01

    Full Text Available Searchable symmetric encryption (SSE enables a client to perform searches over its outsourced encrypted files while preserving privacy of the files and queries. Dynamic schemes, where files can be added or removed, leak more information than static schemes. For dynamic schemes, forward privacy requires that a newly added file cannot be linked to previous searches. We present a new dynamic SSE scheme that achieves forward privacy by replacing the keys revealed to the server on each search. Our scheme is efficient and parallelizable and outperforms the best previous schemes providing forward privacy, and achieves competitive performance with dynamic schemes without forward privacy. We provide a full security proof in the random oracle model. In our experiments on the Wikipedia archive of about four million pages, the server takes one second to perform a search with 100,000 results.

  9. Virtue, Privacy and Self-Determination

    DEFF Research Database (Denmark)

    Stamatellos, Giannis

    2011-01-01

    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user......’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal data. However, scant attention has been paid on a virtue ethics approach of information privacy. Plotinus’ discussion of self......-determination is related to ethical virtue, human freedom and intellectual autonomy. The Plotinian virtue ethics approach of self-determination is not primarily related to the sphere of moral action, but to the quality of the self prior to moral practice. In this paper, it is argued that the problem of information privacy...

  10. Defining Privacy Is Supposed to Be Easy

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Gross, Thomas; Viganò, Luca

    2013-01-01

    Formally specifying privacy goals is not trivial. The most widely used approach in formal methods is based on the static equivalence of frames in the applied pi-calculus, basically asking whether or not the intruder is able to distinguish two given worlds. A subtle question is how we can be sure...... that we have specified all pairs of worlds to properly reflect our intuitive privacy goal. To address this problem, we introduce in this paper a novel and declarative way to specify privacy goals, called α-β privacy, and relate it to static equivalence. This new approach is based on specifying two...... formulae α and β in first-order logic with Herbrand universes, where α reflects the intentionally released information and β includes the actual cryptographic (“technical”) messages the intruder can see. Then α-β privacy means that the intruder cannot derive any “non-technical” statement from β that he...

  11. 27 CFR 5.34 - Brand names.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Brand names. 5.34 Section... Spirits § 5.34 Brand names. (a) Misleading brand names. No label shall contain any brand name, which... officer finds that such brand name (when appropriately qualified if required) conveys no erroneous...

  12. 27 CFR 7.23 - Brand names.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Brand names. 7.23 Section... Beverages § 7.23 Brand names. (a) General. The product shall bear a brand name, except that if not sold under a brand name, then the name of the person required to appear on the brand label shall be deemed a...

  13. Individual performance and leader's laterality in interactive contests.

    Science.gov (United States)

    Mukherjee, Satyam

    2017-05-01

    Left-handedness is known to provide an intrinsic and tactical advantage at top level in many sports involving interactive contests. Again, most of the renowned leaders of the world are known to have been left-handed. Leadership plays an important role in politics, sports and mentorship. In this paper we show that Cricket captains who bat left-handed have a strategic advantage over the right-handed captains in One Day International (ODI) and Test matches. The present study involving 46 left-handed captains and 148 right-handed captains in ODI matches, reveal a strong relation between leader's laterality and team member performance, demonstrating the critical importance of left-handedness and successful leadership. The odds for superior batting performance in an ODI match under left-handed captains are 89% higher than the odds under right-handed captains. Our study shows that left-handed captains are more successful in extracting superior performance from the batsmen and bowlers in ODI and Test matches; perhaps indicating left-handed leaders are better motivators as leaders when compared to right-handed captains.

  14. "Show me your impact": evaluating transitional justice in contested spaces.

    Science.gov (United States)

    Duggan, Colleen

    2012-02-01

    This paper discusses some of the most significant challenges and opportunities for evaluating the effects of programs in support of transitional justice - the field that addresses how post-conflict or post authoritarian societies deal with legacies of wide spread human rights violations. The discussion is empirically grounded in a case study that assesses the efforts of the International Development Research Centre (IDRC) and one of its Guatemalan partners to evaluate the effects of a museum exposition that is attempting to recast historic memory and challenge racist attitudes in post-conflict Guatemala. The paper argues that despite the increasing trend to fund transitional justice programs, many international aid donors are stuck in traditional and arguably orthodox paradigms of program evaluation. This is having a negative effect not only upon the administration of aid but also upon how transitional justice research is perceived and valued by local populations. The case study experience indicates that there is no perfect evaluation model or approach for evaluating transitional justice programming - only choices to be made by commissioners of evaluation, evaluators, and those being evaluated. These are profoundly influenced by the extreme politics and moral values that define transitional justice settings as contested spaces in which calls to remember the tragic past must be balanced with aspirations to re-build a hopeful future. Copyright © 2010. Published by Elsevier Ltd.

  15. Contested Development in Indonesia: Rethinking Ethnicity and Gender in Mining

    Directory of Open Access Journals (Sweden)

    Kristina Großmann

    2017-06-01

    Full Text Available Page Header User Username Password Remember me Notifications View Subscribe Information For Readers Home About Login Register Search Current Archives Submit your Article Leave the Editoral Platform and Return to our Website Home > Vol 10, No 1 (2017 > Großmann Contested Development in Indonesia: Rethinking Ethnicity and Gender in Mining Kristina Großmann, Martina Padmanabhan, Katharina von Braun Abstract This article reviews the literature on the relationship between gender and ethnicity in Indonesia’s mining sector and outlines shortcomings and prospects for further research. Recent studies on mining and gender focus predominantly on women and how they are negatively affected by mining. Ethnicity, although a growing asset in struggles on environmental transformations, is hardly included in research on mining. The intertwinement of ethnicity and gender in elaborations on mining is often depicted in literature of development programs and environmental organizations in which indigenous women are homogenized as marginalized victims. We argue, however, for a multidimensional approach on mining that takes into account the institutionalization of gender and ethnicity in mining governance as well as the role of gender and ethnic identities. Feminist political ecology and institutional analysis are pointing the way for such an approach. Furthermore, other relevant categories such as class, age, or status should be considered in the analysis of the complex and multidimensional environmental transformations of the mining sector in Indonesia.

  16. Heterogeneous information sharing of sensor information in contested environments

    Science.gov (United States)

    Wampler, Jason A.; Hsieh, Chien; Toth, Andrew; Sheatsley, Ryan

    2017-05-01

    The inherent nature of unattended sensors makes these devices most vulnerable to detection, exploitation, and denial in contested environments. Physical access is often cited as the easiest way to compromise any device or network. A new mechanism for mitigating these types of attacks developed under the Assistant Secretary of Defense for Research and Engineering, ASD(R and E) project, "Smoke Screen in Cyberspace", was demonstrated in a live, over-the-air experiment. Smoke Screen encrypts, slices up, and disburses redundant fragments of files throughout the network. Recovery is only possible after recovering all fragments and attacking/denying one or more nodes does not limit the availability of other fragment copies in the network. This experiment proved the feasibility of redundant file fragmentation, and is the foundation for developing sophisticated methods to blacklist compromised nodes, move data fragments from risks of compromise, and forward stored data fragments closer to the anticipated retrieval point. This paper outlines initial results in scalability of node members, fragment size, file size, and performance in a heterogeneous network consisting of the Wireless Network after Next (WNaN) radio and Common Sensor Radio (CSR).

  17. Decision-making and emotions in the contested information environment

    Directory of Open Access Journals (Sweden)

    M.W. Haas

    2016-01-01

    Full Text Available Future conflicts will necessitate the ability to conduct effective military operations in a contested information environment. The building and maintaining of robust situational awareness, protection of decision-making effectiveness of individuals and teams, fighting through information attacks from both in, and through, the cyberspace domain, will be essential. Increasing the knowledge of the mechanisms involved in degrading task performance and decision-making during cyber attacks will enable the development of advanced human-centered defensive techniques that aid fight-through capability. In this position paper, the development and evaluation of software that simulates real-time and persistent manipulation of the information environment is discussed. Results of the evaluation indicated that the task performance of a team of decision-makers performing collaborative tasks could be degraded through real-time manipulation of cyberspace content and operation. The paper concludes with a discussion of focus and direction for future research and development. It is suggested that the building of a deeper understanding of the perceptual and cognitive factors that are significant in the relationship between information environment manipulation and reduction in task performance is required. This understanding will aid in the defence of cyberspace attacks, will aid in fight through and mission assurance, and will aid the Information Operations community.

  18. Design Disruption in Contested, Contingent and Contradictory Future-Making

    Directory of Open Access Journals (Sweden)

    Yoko Akama

    2015-10-01

    Full Text Available This paper aims to problematize how we step into situations that are often contested, contingent and contradictory. In this context, how can we sharpen our sensitivity of the role design plays in generating understanding and future-making possibilities? Here, we employ the term disruption as a way to question our own knowledge construction and research practices in Design Anthropology and Participatory Design. We pursue disruption as a political and necessary consciousness when Design Anthropology meets Participatory Design and discuss the generative, reflexive and analytical dimensions of disruption through three vignettes. These vignettes raises questions of how we interrogate disruptions of power to consider different ways in which this manifests when entering into and participating in ongoing changing process. They also highlight the need to displace existing knowledge, rather than pursuing ‘mutual learning’ that had been a defining commitment of Participatory Design. Lastly, the vignettes reveal the need to disrupt the designer-researcher in order to surrender to contradiction and contingency as part of future-making.

  19. Contested minorities – the case of Upper Silesia

    Directory of Open Access Journals (Sweden)

    Gierczak Dariusz

    2015-06-01

    Full Text Available Upper Silesia in terms of ethnicity is a typical example of a historical region in Europe, but in fact, one of the few exceptions in contemporary Poland, where its mixed ethnic and religious structures have at least partly survived until today. While their existence had been denied by Nazi Germany (1933-1945 as well as by the Polish People's Republic (1945-1989, the emancipation of the German and Silesian minorities after the democratic changes of 1989 have evoked strong emotions in the ethnically almost uniform country. Nonetheless, the recent situation of minorities has improved as never before. Minority organisations has been officially recognized and German finally has become the second language in some municipalities of Upper Silesia, but the largest ethnic group in the whole country, the Silesians, have still experienced no formal recognition as a national minority. This article deals with the demographic aspects of the ethnic groups in Upper Silesia since the 19th century until recent times. The census results concerning the ethnic minorities or languages in Upper Silesia have been contested since the first records of that kind have been taken. The outcomes of the both last censuses of 2002 and 2011 concerning the minority question reflected for the first time a much more realistic picture of the status quo. Furthermore, they showed that the idea of Silesian identification found an unexpected high number of supporters. This fact indicates an emerging meaning of regional identification amid significant changes of cultural values in Polish society.

  20. In the Name of Love

    DEFF Research Database (Denmark)

    Bojesen, Anders; Muhr, Sara Louise

    Accepted Abstract: Most current Human Resource Management discourse stresses coaching, developing and empowering in order to do ‘good' and care for the ‘well-being' of the employees (Steyaert & Janssens, 1999). Legge (1999) symbolizes HRM discourse by the employee being a family member subordinated...... for mankind - in the name of care for the other", and Zizek (2003:23) in a similar matter when he points out that "the ultimate source of evil is compassion itself". Butler (2005) refers to ethical violence when she describes the rigid ethical standards set out to be what Kaulingfreks calls the ‘keeper...

  1. Social Media Users’ Legal Consciousness About Privacy

    Directory of Open Access Journals (Sweden)

    Katharine Sarikakis

    2017-02-01

    Full Text Available This article explores the ways in which the concept of privacy is understood in the context of social media and with regard to users’ awareness of privacy policies and laws in the ‘Post-Snowden’ era. In the light of presumably increased public exposure to privacy debates, generated partly due to the European “Right to be Forgotten” ruling and the Snowden revelations on mass surveillance, this article explores users’ meaning-making of privacy as a matter of legal dimension in terms of its violations and threats online and users’ ways of negotiating their Internet use, in particular social networking sites. Drawing on the concept of legal consciousness, this article explores through focus group interviews the ways in which social media users negotiate privacy violations and what role their understanding of privacy laws (or lack thereof might play in their strategies of negotiation. The findings are threefold: first, privacy is understood almost universally as a matter of controlling one’s own data, including information disclosure even to friends, and is strongly connected to issues about personal autonomy; second, a form of resignation with respect to control over personal data appears to coexist with a recognized need to protect one’s private data, while respondents describe conscious attempts to circumvent systems of monitoring or violation of privacy, and third, despite widespread coverage of privacy legal issues in the press, respondents’ concerns about and engagement in “self-protecting” tactics derive largely from being personally affected by violations of law and privacy.

  2. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.

    Science.gov (United States)

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-11-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.

  3. Contestation, contingency, and justice in the Nordic low-carbon energy transition

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.

    2017-01-01

    The five Nordic countries have aggressive climate and energy policies in place and have already emerged to be leaders in renewable energy and energy efficiency. Denmark is renowned for its pioneering use of wind energy, Finland and Sweden bioenergy, Norway hydroelectricity and Iceland geothermal energy. All countries aim to be virtually “fossil free” by 2050. This study explores the Nordic energy transition through the lens of three interconnected research questions: How are they doing it? What challenges exist? And what broader lessons result for energy policy? The study firstly investigates the pathways necessary for these five countries to achieve their low-carbon goals. It argues that a concerted effort must be made to (1) promote decentralized and renewable forms of electricity supply; (2) shift to more sustainable forms of transport; (3) further improve the energy efficiency of residential and commercial buildings; and (4) adopt carbon capture and storage technologies for industry. However, the section that follows emphasizes some of the empirical barriers the Nordic transition must confront, namely political contestation, technological contingency, and social justice and recognition concerns. The study concludes with implications for what such historical progress, and future transition pathways, mean for both energy researchers and energy planners. - Highlights: • Nordic countries have strong energy and climate policies to be practically “fossil free” by 2050. • Decarbonization and transition pathways depend on renewable energy, efficiency, transport, and industry. • The Nordic transition remains contingent on further technological innovations and policy commitments. • It also raises energy justice issues concerning employment, public knowledge, and embodied emissions.

  4. Public privacy: Reciprocity and Silence

    Directory of Open Access Journals (Sweden)

    Jenny Kennedy

    2014-10-01

    Full Text Available In his 1958 poem 'Dedication to my Wife' TS Eliot proclaims "these are private words addressed to you in public". Simultaneously written for his wife, Valerie Fletcher, and to the implied you of a discourse network, Eliot's poem helps to illustrate the narrative voices and silences that are constitutive of an intimate public sphere. This paper situates reciprocity as a condition of possibility for public privacy. It shows how reciprocity is enabled by systems of code operating through material and symbolic registers. Code promises to control communication, to produce neutral, systemic forms of meaning. Yet such automation is challenged by uneven and fragmented patterns of reciprocity. Moreover, examining the media of public privacy reveals historical trajectories important for understanding contemporary socio­technical platforms of reciprocity. To explore the implicit requirement of reciprocity in publicly private practices, three sites of communication are investigated framed by a media archaeology perspective: postal networks, the mail­art project PostSecret and the anonymous zine 'You'.

  5. 76 FR 30952 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2011-05-27

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on... the Department. These assessments were approved and published on the Privacy Office's web site between..., 2011 and March 31, 2011, the Chief Privacy Officer of the DHS approved and published sixteen Privacy...

  6. 76 FR 58814 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2011-09-22

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on... DHS. These assessments were approved and published on the Privacy Office's Web site between June 1... 31, 2011, the Chief Privacy Officer of the DHS approved and published twenty-six Privacy Impact...

  7. 76 FR 78934 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2011-12-20

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on.... These assessments were approved and published on the Privacy Office's web site between September 1, 2011... November 30, 2011, the Chief Privacy Officer of the DHS approved and published seven Privacy Impact...

  8. 77 FR 46100 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2012-08-02

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on... published on the Privacy Office's Web site between March 1, 2012 and May 31, 2012. DATES: The PIAs will be... approved and published fifteen Privacy Impact Assessments (PIAs) on the DHS Privacy Office Web site, www...

  9. 76 FR 37823 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2011-06-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on... Department. These assessments were approved and published on the Privacy Office's Web site between March 31... 31, 2011, the Chief Privacy Officer of the DHS approved and published ten Privacy Impact Assessments...

  10. Fourteen Reasons Privacy Matters: A Multidisciplinary Review of Scholarly Literature

    Science.gov (United States)

    Magi, Trina J.

    2011-01-01

    Librarians have long recognized the importance of privacy to intellectual freedom. As digital technology and its applications advance, however, efforts to protect privacy may become increasingly difficult. With some users behaving in ways that suggest they do not care about privacy and with powerful voices claiming that privacy is dead, librarians…

  11. 12 CFR 573.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Model privacy form and examples. 573.2 Section... FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model... privacy form is not required. (b) Examples. The examples in this part are not exclusive. Compliance with...

  12. 17 CFR 160.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-04-01

    ... examples. 160.2 Section 160.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  13. 12 CFR 332.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model... this part, although use of the model privacy form is not required. (b) Examples. The examples in this...

  14. 12 CFR 216.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a... of this part, although use of the model privacy form is not required. (b) Examples. The examples in...

  15. 45 CFR 503.1 - Definitions-Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  16. 45 CFR 503.2 - General policies-Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  17. 75 FR 28051 - Public Workshop: Pieces of Privacy

    Science.gov (United States)

    2010-05-19

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Pieces of Privacy AGENCY: Privacy Office, DHS. ACTION: Notice announcing public workshop. SUMMARY: The Department of Homeland Security Privacy Office will host a public workshop, ``Pieces of Privacy.'' DATES: The workshop will be...

  18. 48 CFR 52.224-2 - Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act of...

  19. 43 CFR 2.47 - Records subject to Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Records subject to Privacy Act. 2.47 Section 2.47 Public Lands: Interior Office of the Secretary of the Interior RECORDS AND TESTIMONY; FREEDOM OF INFORMATION ACT Privacy Act § 2.47 Records subject to Privacy Act. The Privacy Act applies to all...

  20. Data privacy foundations, new developments and the big data challenge

    CERN Document Server

    Torra, Vicenç

    2017-01-01

    This book offers a broad, cohesive overview of the field of data privacy. It discusses, from a technological perspective, the problems and solutions of the three main communities working on data privacy: statistical disclosure control (those with a statistical background), privacy-preserving data mining (those working with data bases and data mining), and privacy-enhancing technologies (those involved in communications and security) communities. Presenting different approaches, the book describes alternative privacy models and disclosure risk measures as well as data protection procedures for respondent, holder and user privacy. It also discusses specific data privacy problems and solutions for readers who need to deal with big data.

  1. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  2. 76 FR 41274 - Privacy Act of 1974; Department of Homeland Security/ALL-033 Reasonable Accommodations Records...

    Science.gov (United States)

    2011-07-13

    ..., telecommuting, or reassignment to a vacant position; and/or (3) acquisition or modification of equipment or... the control of an agency for which information is retrieved by the name of an individual or by some... possession or under the control of DHS by complying with DHS Privacy Act regulations, 6 CFR Part 5. The...

  3. Kids Sell: Celebrity Kids’ Right to Privacy

    Directory of Open Access Journals (Sweden)

    Seong Choul Hong

    2016-04-01

    Full Text Available The lives of celebrities are often spotlighted in the media because of their newsworthiness; however, many celebrities argue that their right to privacy is often infringed upon. Concerns about celebrity privacy are not limited to the celebrities themselves and often expand to their children. As a result of their popularity, public interest has pushed paparazzi and journalists to pursue trivial and private details about the lives of both celebrities and their children. This paper investigates conflicting areas where the right to privacy and the right to know collide when dealing with the children of celebrities. In general, the courts have been unsympathetic to celebrity privacy claims, noting their newsworthiness and self-promoted characteristic. Unless the press violates news-gathering ethics or torts, the courts will often rule in favor of the media. However, the story becomes quite different when related to an infringement on the privacy of celebrities’ children. This paper argues that all children have a right to protect their privacy regardless of their parents’ social status. Children of celebrities should not be exempt to principles of privacy just because their parents are a celebrity. Furthermore, they should not be exposed by the media without the voluntary consent of their legal patrons. That is, the right of the media to publish and the newsworthiness of children of celebrities must be restrictedly acknowledged.

  4. Privacy-preserving heterogeneous health data sharing.

    Science.gov (United States)

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-05-01

    Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis.

  5. New threats to health data privacy.

    Science.gov (United States)

    Li, Fengjun; Zou, Xukai; Liu, Peng; Chen, Jake Y

    2011-11-24

    Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.

  6. Privacy by design in personal health monitoring.

    Science.gov (United States)

    Nordgren, Anders

    2015-06-01

    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted.

  7. Recommendations for natural bodybuilding contest preparation: resistance and cardiovascular training.

    Science.gov (United States)

    Helms, E R; Fitschen, P J; Aragon, A A; Cronin, J; Schoenfeld, B J

    2015-03-01

    The anabolic effect of resistance training can mitigate muscle loss during contest preparation. In reviewing relevant literature, we recommend a periodized approach be utilized. Block and undulating models show promise. Muscle groups should be trained 2 times weekly or more, although high volume training may benefit from higher frequencies to keep volume at any one session from becoming excessive. Low to high (~3-15) repetitions can be utilized but most repetitions should occur in the 6-12 range using 70-80% of 1 repetition maximum. Roughly 40-70 reps per muscle group per session should be performed, however higher volume may be appropriate for advanced bodybuilders. Traditional rest intervals of 1-3 minutes are adequate, but longer intervals can be used. Tempo should allow muscular control of the load; 1-2 s concentric and 2-3 s eccentric tempos. Training to failure should be limited when performing heavy loads on taxing exercises, and primarily relegated to single-joint exercises and higher repetitions. A core of multi-joint exercises with some single-joint exercises to address specific muscle groups as needed should be used, emphasizing full range of motion and proper form. Cardiovascular training can be used to enhance fat loss. Interference with strength training adaptations increases concomitantly with frequency and duration of cardiovascular training. Thus, the lowest frequency and duration possible while achieving sufficient fat loss should be used. Full-body modalities or cycling may reduce interference. High intensities may as well; however, require more recovery. Fasted cardiovascular training may not have benefits over fed-state and could be detrimental.

  8. Theatrical Tectonics: The Mediating Agent for a Contesting Practice

    Directory of Open Access Journals (Sweden)

    Gevork Hartoonian

    2014-07-01

    Full Text Available This paper posits the idea that the theme of agency in architecture is parallactic. It discusses the tectonic as an agent through which architecture turns into a state of constant flux. The intention is to promote a discourse of criticality, the thematic of which is drawn from the symptoms that galvanise architecture’s rapport with the image-laden culture of late capitalism. In an attempt to log the thematic of a contested practice, this essay will re-map the recent history of contemporary architecture.Exploring New Brutalism’s criticism of the established ethos of International Style architecture, the first part of this paper will highlight the movement’s tendency towards replacing the painterly with the sculptural, and this in reference to the contemporary interest in monolithic architecture. Having established the import of tectonics for the architecture of Brutalism, the paper then argues that in the present situation, when architecture – like other cultural products – is infatuated with the spectacle of late capitalism, a re-thinking of the Semperian notion of theatricality is useful. Of interest in the tectonic of theatricality is the work’s capacity to bring forth the division between intellectual and physical labours, and this in reference to architecture’s reserved acceptance of technification for which the aforementioned division is vital.Particular attention will be given to two projects, Zaha Hadid’s Phaeno Center and OMA’s Casa da Musica, where architectonic aspects of New Brutalism are revisited in the light of the tectonic of theatricality.

  9. 77 FR 33761 - Privacy Act of 1974; Notification to Update an Existing Privacy Act System of Records, “Grievance...

    Science.gov (United States)

    2012-06-07

    ... of a data breach. (See also on HUD's privacy Web site, Appendix I for other ways that the Privacy Act... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5613-N-04] Privacy Act of 1974; Notification to Update an Existing Privacy Act System of Records, ``Grievance Records'' AGENCY: Office of the...

  10. Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency

    Science.gov (United States)

    Mohaisen, Abedelaziz; Jho, Nam-Su; Hong, Dowon; Nyang, Daehun

    Privacy preserving association rule mining algorithms have been designed for discovering the relations between variables in data while maintaining the data privacy. In this article we revise one of the recently introduced schemes for association rule mining using fake transactions (FS). In particular, our analysis shows that the FS scheme has exhaustive storage and high computation requirements for guaranteeing a reasonable level of privacy. We introduce a realistic definition of privacy that benefits from the average case privacy and motivates the study of a weakness in the structure of FS by fake transactions filtering. In order to overcome this problem, we improve the FS scheme by presenting a hybrid scheme that considers both privacy and resources as two concurrent guidelines. Analytical and empirical results show the efficiency and applicability of our proposed scheme.

  11. The study on privacy preserving data mining for information security

    Science.gov (United States)

    Li, Xiaohui

    2012-04-01

    Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.

  12. Privacy Challenges of Genomic Big Data.

    Science.gov (United States)

    Shen, Hong; Ma, Jian

    2017-01-01

    With the rapid advancement of high-throughput DNA sequencing technologies, genomics has become a big data discipline where large-scale genetic information of human individuals can be obtained efficiently with low cost. However, such massive amount of personal genomic data creates tremendous challenge for privacy, especially given the emergence of direct-to-consumer (DTC) industry that provides genetic testing services. Here we review the recent development in genomic big data and its implications on privacy. We also discuss the current dilemmas and future challenges of genomic privacy.

  13. Privacy Breach Analysis in Social Networks

    Science.gov (United States)

    Nagle, Frank

    This chapter addresses various aspects of analyzing privacy breaches in social networks. We first review literature that defines three types of privacy breaches in social networks: interactive, active, and passive. We then survey the various network anonymization schemes that have been constructed to address these privacy breaches. After exploring these breaches and anonymization schemes, we evaluate a measure for determining the level of anonymity inherent in a network graph based on its topological structure. Finally, we close by emphasizing the difficulty of anonymizing social network data while maintaining usability for research purposes and offering areas for future work.

  14. Privacy-Preserving Restricted Boltzmann Machine

    Directory of Open Access Journals (Sweden)

    Yu Li

    2014-01-01

    Full Text Available With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM. The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model.

  15. Routes for breaching and protecting genetic privacy.

    Science.gov (United States)

    Erlich, Yaniv; Narayanan, Arvind

    2014-06-01

    We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these data sets is vital for progress in biomedical research. However, a growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, indicate the underlying assumptions, and assess their technological complexity and maturation. We then review potential mitigation methods for privacy-preserving dissemination of sensitive data and highlight different cases that are relevant to genetic applications.

  16. Blood rights: the body and information privacy.

    Science.gov (United States)

    Alston, Bruce

    2005-05-01

    Genetic and other medical technology makes blood, human tissue and other bodily samples an immediate and accessible source of comprehensive personal and health information about individuals. Yet, unlike medical records, bodily samples are not subject to effective privacy protection or other regulation to ensure that individuals have rights to control the collection, use and transfer of such samples. This article examines the existing coverage of privacy legislation, arguments in favour of baseline protection for bodily samples as sources of information and possible approaches to new regulation protecting individual privacy rights in bodily samples.

  17. Privacy in Online Social Networking Sites

    OpenAIRE

    M.Ida Evones

    2015-01-01

    There are more than 192 act ive social networking websites. Bringing every kind of social group together in one place and letting them interact is really a big thing indeed .Huge amount of information process in the sites each day, end up making it vulnerable to attack. There is no systematic framework taking into account the importance of privacy. Increased privacy settings don’t always guarantee privacy when there is a loop hole in the applications. Lack of user education results is over sh...

  18. 5G Visions of User Privacy

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    2015-01-01

    Currently, the discussions are going on the elements and definition of 5G networks. One of the elements in this discussion is how to provide for user controlled privacy for securing users' digital interaction. The purpose of this paper is to present elements of user controlled privacy needed...... for the future 5G networks. The paper concludes that an ecosystem consisting of Trusted Third Party between the end user and the service providers as a distributed system could be integrated to secure the perspective of user controlled privacy for future systems...

  19. 5 CFR 890.1069 - Information the debarring official must consider in deciding a provider's contest of proposed...

    Science.gov (United States)

    2010-01-01

    ... Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) FEDERAL... deciding a provider's contest of proposed penalties and assessments. (a) Documentary material and written...

  20. A privacy protection model to support personal privacy in relational databases.

    OpenAIRE

    2008-01-01

    The individual of today incessantly insists on more protection of his/her personal privacy than a few years ago. During the last few years, rapid technological advances, especially in the field of information technology, directed most attention and energy to the privacy protection of the Internet user. Research was done and is still being done covering a vast area to protect the privacy of transactions performed on the Internet. However, it was established that almost no research has been don...