WorldWideScience

Sample records for science foundation privacy

  1. Foundations of image science

    CERN Document Server

    Barrett, Harrison H

    2013-01-01

    Winner of the 2006 Joseph W. Goodman Book Writing Award! A comprehensive treatment of the principles, mathematics, and statistics of image science In today's visually oriented society, images play an important role in conveying messages. From seismic imaging to satellite images to medical images, our modern society would be lost without images to enhance our understanding of our health, our culture, and our world. Foundations of Image Science presents a comprehensive treatment of the principles, mathematics, and st

  2. Data privacy foundations, new developments and the big data challenge

    CERN Document Server

    Torra, Vicenç

    2017-01-01

    This book offers a broad, cohesive overview of the field of data privacy. It discusses, from a technological perspective, the problems and solutions of the three main communities working on data privacy: statistical disclosure control (those with a statistical background), privacy-preserving data mining (those working with data bases and data mining), and privacy-enhancing technologies (those involved in communications and security) communities. Presenting different approaches, the book describes alternative privacy models and disclosure risk measures as well as data protection procedures for respondent, holder and user privacy. It also discusses specific data privacy problems and solutions for readers who need to deal with big data.

  3. Physical foundations of materials science

    CERN Document Server

    Gottstein, Günter

    2004-01-01

    In this vivid and comprehensible introduction to materials science, the author expands the modern concepts of metal physics to formulate basic theory applicable to other engineering materials, such as ceramics and polymers. Written for engineering students and working engineers with little previous knowledge of solid-state physics, this textbook enables the reader to study more specialized and fundamental literature of materials science. Dozens of illustrative photographs, many of them Transmission Electron Microscopy images, plus line drawings, aid developing a firm appreciation of this complex topic. Hard-to-grasp terms such as "textures" are lucidly explained - not only the phenomenon itself, but also its consequences for the material properties. This excellent book makes materials science more transparent.

  4. A new foundation for the social sciences?

    DEFF Research Database (Denmark)

    Bjerre, Jørn

    2015-01-01

    The aim of John Searle’s philosophy of society is to provide a foundation for the social sciences. Arguing that the study of social reality needs to be based on a philosophy of language, Searle claims that sociology has little to offer, since no sociologist ever took language seriously. Attacking...

  5. Plasma Physics at the National Science Foundation

    Science.gov (United States)

    Lukin, Vyacheslav

    2017-10-01

    The Town Meeting on Plasma Physics at the National Science Foundation will provide an opportunity for Q&A about the variety of NSF programs and solicitations relevant to a broad cross-section of the academic plasma science community, from graduating college seniors to senior leaders in the field, and from plasma astrophysics to basic physics to plasma engineering communities. We will discuss recent NSF-hosted events, research awards, and multi-agency partnerships aimed at enabling the progress of science in plasma science and engineering. Future outlook for plasma physics and broader plasma science support at NSF, with an emphasis on how you can help NSF to help the community, will be speculated upon within the uncertainty of the federal budgeting process.

  6. The National Science Foundation and the History of Science

    Science.gov (United States)

    Rothenberg, Marc

    2014-01-01

    The National Science Foundation (NSF) is the major funder of the history of science in the United States. Between 1958 and 2010, the NSF program for the history of science has given 89 awards in the history of astronomy. This paper analyzes the award recipients and subject areas of the awards and notes significant shifts in the concentration of award recipients and the chronological focus of the research being funded.

  7. General Atomics Sciences Education Foundation Outreach Programs

    Science.gov (United States)

    Winter, Patricia S.

    1997-11-01

    Scientific literacy for all students is a national goal. The General Atomics (GA) Foundation Outreach Program is committed to playing a major role in enhancing pre-college education in science, engineering and new technologies. GA has received wide recognition for its Sciences Education Program, a volunteer effort of GA employees and San Diego science teachers. GA teacher/scientist teams have developed inquiry-based education modules and associated workshops based on areas of core competency at GA: Fusion -- Energy of the Stars; Explorations in Materials Science; Portrait of an Atom; DNA Technology. [http://www.sci-ed-ga.org]. Workshops [teachers receive printed materials and laboratory kits for ``hands-on" modules] have been presented for 700+ teachers from 200+ area schools. Additional workshops include: University of Denver for Denver Public Schools; National Educators Workshop; Standard Experiments in Engineering Materials; Update '96 in Los Alamos; Newspapers in Education Workshop (LA Times); American Chemical Society Regional/National meetings, and California Science Teachers Association Conference. Other outreach includes High School Science Day, school partnerships, teacher and student mentoring and the San Diego Science Alliance [http://www.sdsa.org].

  8. 45 CFR 650.2 - National Science Foundation patent policy.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false National Science Foundation patent policy. 650.2... FOUNDATION PATENTS § 650.2 National Science Foundation patent policy. As authorized by the National Science... adopted the following statement of NSF patent policy. (a) In accordance with the Bayh-Dole Act and the...

  9. Exercising privacy rights in medical science.

    Science.gov (United States)

    Hillmer, Michael; Redelmeier, Donald A

    2007-12-04

    Privacy laws are intended to preserve human well-being and improve medical outcomes. We used the Sportstats website, a repository of competitive athletic data, to test how easily these laws can be circumvented. We designed a haphazard, unrepresentative case-series analysis and applied unscientific methods based on an Internet connection and idle time. We found it both feasible and titillating to breach anonymity, stockpile personal information and generate misquotations. We extended our methods to snoop on celebrities, link to outside databases and uncover refusal to participate. Throughout our study, we evaded capture and public humiliation despite violating these 6 privacy fundamentals. We suggest that the legitimate principle of safeguarding personal privacy is undermined by the natural human tendency toward showing off.

  10. Mathematical logic foundations for information science

    CERN Document Server

    Li, Wei

    2014-01-01

    Mathematical logic is a branch of mathematics that takes axiom systems and mathematical proofs as its objects of study. This book shows how it can also provide a foundation for the development of information science and technology. The first five chapters systematically present the core topics of classical mathematical logic, including the syntax and models of first-order languages, formal inference systems, computability and representability, and Gödel’s theorems. The last five chapters present extensions and developments of classical mathematical logic, particularly the concepts of version sequences of formal theories and their limits, the system of revision calculus, proschemes (formal descriptions of proof methods and strategies) and their properties, and the theory of inductive inference. All of these themes contribute to a formal theory of axiomatization and its application to the process of developing information technology and scientific theories. The book also describes the paradigm of three kinds...

  11. Exercising privacy rights in medical science

    OpenAIRE

    Hillmer, Michael; Redelmeier, Donald A.

    2007-01-01

    Privacy laws are intended to preserve human well-being and improve medical outcomes. We used the Sportstats website, a repository of competitive athletic data, to test how easily these laws can be circumvented. We designed a haphazard, unrepresentative case-series analysis and applied unscientific methods based on an Internet connection and idle time. We found it both feasible and titillating to breach anonymity, stockpile personal information and generate misquotations. We extended our metho...

  12. Behavioural Sciences and the Regulation of Privacy on the Internet

    NARCIS (Netherlands)

    Zuiderveen Borgesius, F.; Alemanno, A.; Sibony, A.-L.

    2015-01-01

    This chapter examines the policy implications of behavioural sciences insights for the regulation of privacy on the Internet, by focusing in particular on behavioural targeting. This marketing technique involves tracking people’s online behaviour to use the collected information to show people

  13. Dr. William C. Harris, Director-General, Science Foundation Ireland

    CERN Multimedia

    Maximilien Brice

    2002-01-01

    Pictured with Robert Eisenstein, former assistant director for mathematical and physical sciences (MPS) at the US National Science Foundation (NSF), who is spending a year at CERN as a member of the ATLAS collaboration.

  14. Surface Science Foundations of Catalysis and Nanoscience

    CERN Document Server

    Kolasinski, Kurt K

    2012-01-01

    Surface science has evolved beyond being a sub-field of chemistry or physics and has now become an underpinning science. The Third Edition of this book incorporates extensive worked solutions, as well as details on how problem solving relevant to surface science should be performed. It contextualizes the exercises and their solutions to further explicate the methods of problem solving, application of scientific principles and to deliver a deeper understanding of the field of surface science. Solutions will be accompanied by figures and/or graphs of data, as appropriate.

  15. Logic, mathematics, and computer science modern foundations with practical applications

    CERN Document Server

    Nievergelt, Yves

    2015-01-01

    This text for the first or second year undergraduate in mathematics, logic, computer science, or social sciences, introduces the reader to logic, proofs, sets, and number theory. It also serves as an excellent independent study reference and resource for instructors. Adapted from Foundations of Logic and Mathematics: Applications to Science and Cryptography © 2002 Birkhӓuser, this second edition provides a modern introduction to the foundations of logic, mathematics, and computers science, developing the theory that demonstrates construction of all mathematics and theoretical computer science from logic and set theory.  The focus is on foundations, with specific statements of all the associated axioms and rules of logic and set theory, and  provides complete details and derivations of formal proofs. Copious references to literature that document historical development is also provided. Answers are found to many questions that usually remain unanswered: Why is the truth table for logical implication so uni...

  16. Surface Science Foundations of Catalysis and Nanoscience

    CERN Document Server

    Kolasinski, Kurt K

    2012-01-01

    Surface science has evolved from being a sub-field of chemistry or physics, and has now established itself as an interdisciplinary topic. Knowledge has developed sufficiently that we can now understand catalysis from a surface science perspective. No-where is the underpinning nature of surface science better illustrated than with nanoscience. Now in its third edition, this successful textbook aims to provide students with an understanding of chemical transformations and the formation of structures at surfaces. The chapters build from simple to more advanced principles with each featuring exerc

  17. Commonly Shared Foundation of Mathematics, Information Science, Natural Science, Social Science, and Theology

    OpenAIRE

    Wayne, James J.

    2014-01-01

    Through a simple thought experiment, this paper shows that there must be a shared foundation of mathematics, information science, natural science, social science, and theology. The thought experiment is to ask a volunteer to write down an arbitrary real number between 0 and 1 with many digits. For example, 0.19823765010367129462…. would be one of such numbers. Then we analyze this experiment result by asking five simple questions: Is the real number a random real? Can the observed real numbe...

  18. Foundations for a new science of learning.

    Science.gov (United States)

    Meltzoff, Andrew N; Kuhl, Patricia K; Movellan, Javier; Sejnowski, Terrence J

    2009-07-17

    Human learning is distinguished by the range and complexity of skills that can be learned and the degree of abstraction that can be achieved compared with those of other species. Homo sapiens is also the only species that has developed formal ways to enhance learning: teachers, schools, and curricula. Human infants have an intense interest in people and their behavior and possess powerful implicit learning mechanisms that are affected by social interaction. Neuroscientists are beginning to understand the brain mechanisms underlying learning and how shared brain systems for perception and action support social learning. Machine learning algorithms are being developed that allow robots and computers to learn autonomously. New insights from many different fields are converging to create a new science of learning that may transform educational practices.

  19. Introductory Statistics Education and the National Science Foundation

    Science.gov (United States)

    Hall, Megan R.; Rowell, Ginger Holmes

    2008-01-01

    This paper describes 27 National Science Foundation supported grant projects that have innovations designed to improve teaching and learning in introductory statistics courses. The characteristics of these projects are compared with the six recommendations given in the "Guidelines for Assessment and Instruction in Statistics Education (GAISE)…

  20. Seven propositions of the science of improvement: exploring foundations.

    Science.gov (United States)

    Perla, Rocco J; Provost, Lloyd P; Parry, Gareth J

    2013-01-01

    The phrase "Science of Improvement" or "Improvement Science" is commonly used today by a range of people and professions to mean different things, creating confusion to those trying to learn about improvement. In this article, we briefly define the concepts of improvement and science, and review the history of the consideration of "improvement" as a science. We trace key concepts and ideas in improvement to their philosophical and theoretical foundation with a focus on Deming's System of Profound Knowledge. We suggest that Deming's system has a firm association with many contemporary and historic philosophic and scientific debates and concepts. With reference to these debates and concepts, we identify 7 propositions that provide the scientific and philosophical foundation for the science of improvement. A standard view of the science of improvement does not presently exist that is grounded in the philosophical and theoretical basis of the field. The 7 propositions outlined here demonstrate the value of examining the underpinnings of improvement. This is needed to both advance the field and minimize confusion about what the phrase "science of improvement" represents. We argue that advanced scientists of improvement are those who like Deming and Shewhart can integrate ideas, concepts, and models between scientific disciplines for the purpose of developing more robust improvement models, tools, and techniques with a focus on application and problem solving in real world contexts. The epistemological foundations and theoretical basis of the science of improvement and its reasoning methods need to be critically examined to ensure its continued development and relevance. If improvement efforts and projects in health care are to be characterized under the canon of science, then health care professionals engaged in quality improvement work would benefit from a standard set of core principles, a standard lexicon, and an understanding of the evolution of the science of

  1. Privacy and the First Amendment. Freedom of Information Foundation Series No. 5.

    Science.gov (United States)

    Clancy, Paul

    Two strong constitutional principles--the right of privacy and freedom of the press--are headed for a major confrontation in the courts. This document explores the complex problems involved in balancing the interests of individuals and of society (the first amendment is a remedy against government, not a weapon against the people). Consideration…

  2. The Eugenides Foundation Interactive Exhibition of Science and Technology

    Science.gov (United States)

    Kontogiannis, Ioannis

    2010-01-01

    The Interactive Exhibition of Science and Technology is installed in an area of 1200 m2 at the Eugenides Foundation. 65 interactive exhibits, designed by the "Cites des Science et de l' Industrie" are organised in themes, stimulate the visitors' mind and provoke scientific thinking. Parallel activities take place inside the exhibition, such as live science demonstrations, performed by young scientists. Extra material such as news bulletins (short news, science comics and portraits), educational paths and treasure-hunting based games, all available online as well, are prepared on a monthly basis and provided along with the visit to the exhibition. Through these exhibits and activities, scientific facts are made simple and easy to comprehend using modern presentation tools. We present details on how this exhibition acts complementary to the science education provided by schools, making it a highly sophisticated educational tool.

  3. Fuzziness and Foundations of Exact and Inexact Sciences

    CERN Document Server

    Dompere, Kofi Kissi

    2013-01-01

    The monograph is an examination of the fuzzy rational foundations of the structure of exact and inexact sciences over the epistemological space which is distinguished from the ontological space. It is thus concerned with the demarcation problem. It examines exact science and its critique of inexact science. The role of fuzzy rationality in these examinations is presented. The driving force of the discussions is the nature of the information that connects the cognitive relational structure of the epistemological space to the ontological space for knowing. The knowing action is undertaken by decision-choice agents who must process information to derive exact-inexact or true-false conclusions. The information processing is done with a paradigm and laws of thought that constitute the input-output machine. The nature of the paradigm selected depends on the nature of the information structure that is taken as input of the thought processing. Generally, the information structure received from the ontological space i...

  4. Dr Pierre Perrolle, Director, Office of International Science and Engineering, National Science Foundation, United States of America

    CERN Multimedia

    Maximilien Brice

    2002-01-01

    Photo 01: Dr Pierre Perrolle, Director, Office of International Science and Engineering, National Science Foundation, USA (second from right) in the ATLAS assembly hall with from left to right Randi Ruchti, Peter Jenni and Robert Eisenstein, Senior Science Advisor, National Science Foundation, USA. Photo 02: Dr Pierre Perrolle, Director, Office of International Science and Engineering, National Science Foundation, USA (second from right) in the ATLAS assembly hall with from left to right Randi Ruchti, Robert Eisenstein, Senior Science Advisor, National Science Foundation, USA and Peter Jenni. Photo 03: Dr Pierre Perrolle, Director, Office of International Science and Engineering, National Science Foundation, USA (second from right) in front of the ATLAS End-Cap Toroid vacuum vessel in the ATLAS assembly hall with from left to right Peter Jenni, Robert Eisenstein, Senior Science Advisor, National Science Foundation, USA and Randi Ruchti ________________________________

  5. Security and privacy in cyber-physical systems foundations, principles, and applications

    CERN Document Server

    Song, Houbing; Jeschke, Sabina

    2017-01-01

    Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today's simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovat...

  6. The logical foundations of forensic science: towards reliable knowledge.

    Science.gov (United States)

    Evett, Ian

    2015-08-05

    The generation of observations is a technical process and the advances that have been made in forensic science techniques over the last 50 years have been staggering. But science is about reasoning-about making sense from observations. For the forensic scientist, this is the challenge of interpreting a pattern of observations within the context of a legal trial. Here too, there have been major advances over recent years and there is a broad consensus among serious thinkers, both scientific and legal, that the logical framework is furnished by Bayesian inference (Aitken et al. Fundamentals of Probability and Statistical Evidence in Criminal Proceedings). This paper shows how the paradigm has matured, centred on the notion of the balanced scientist. Progress through the courts has not been always smooth and difficulties arising from recent judgments are discussed. Nevertheless, the future holds exciting prospects, in particular the opportunities for managing and calibrating the knowledge of the forensic scientists who assign the probabilities that are at the foundation of logical inference in the courtroom. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  7. Better Broader Impacts through National Science Foundation Centers

    Science.gov (United States)

    Campbell, K. M.

    2010-12-01

    National Science Foundation Science and Technology Centers (STCs) play a leading role in developing and evaluating “Better Broader Impacts”; best practices for recruiting a broad spectrum of American students into STEM fields and for educating these future professionals, as well as their families, teachers and the general public. With staff devoted full time to Broader Impacts activities, over the ten year life of a Center, STCs are able to address both a broad range of audiences and a broad range of topics. Along with other NSF funded centers, such as Centers for Ocean Sciences Education Excellence, Engineering Research Centers and Materials Research Science and Engineering Centers, STCs develop both models and materials that individual researchers can adopt, as well as, in some cases, direct opportunities for individual researchers to offer their disciplinary research expertise to existing center Broader Impacts Programs. The National Center for Earth-surface Dynamics is an STC headquartered at the University of Minnesota. NCED’s disciplinary research spans the physical, biological and engineering issues associated with developing an integrative, quantitative and predictive understanding of rivers and river basins. Funded in 2002, we have had the opportunity to partner with individuals and institutions ranging from formal to informal education and from science museums to Tribal and women’s colleges. We have developed simple table top physical models, complete museum exhibitions, 3D paper maps and interactive computer based visualizations, all of which have helped us communicate with this wide variety of learners. Many of these materials themselves or plans to construct them are available online; in many cases they have also been formally evaluated. We have also listened to the formal and informal educators with whom we partner, from whom we have learned a great deal about how to design Broader Impacts activities and programs. Using NCED as a case study

  8. [Analysis of ophthalmic projects granted by National Natural Science Foundation].

    Science.gov (United States)

    Shao, Jing-Jing; Mo, Xiao-Fen; Pan, Zhi-Qiang; Gan, De-Kang; Xu, Yan-Ying

    2008-09-01

    To understand the status of basic research work in the field of ophthalmology by analyzing the projects funded by the National Natural Science Foundation of China (NSFC) from the year of 1986 to 2007, and offer as a reference to the ophthalmologists and researchers. NSFC supported ophthalmology projects in the 22 year's period were collected from the database of NSFC. The field of funded projects, the research team and their achievements were analyzed. There were 228 applicants from 47 home institutions were funded in the field of ophthalmology during the past 22 years, 323 projects funded with 66.74 million Yuan in total, in which 165 projects were fulfilled before the end of 2006. The applied and funded projects mainly focus on six different kinds of research area related to retinal diseases, corneal diseases, glaucoma, optic nerve diseases, myopia and cataract, and 70% of them were basic research in nature. As a brief achievement of 165 fulfilled projects, more than 610 papers were published in domestic journals, over 140 papers were published in Science Citation Index journals, more than 600 people were trained, and over 20 scientific awards were obtained. The number of funded projects and achievement of fulfilled projects in the discipline of ophthalmology gradually increased over the past two decades, the research fields were concentrated in certain diseases. NSFC has played an important role in promoting the development of ophthalmology research and bringing up specialists in China. However, clinical research, continuously research, transforming from basic research to clinic applications and multidisciplinary cross studies should be strengthened.

  9. Space Weather Research at the National Science Foundation

    Science.gov (United States)

    Moretto, T.

    2015-12-01

    There is growing recognition that the space environment can have substantial, deleterious, impacts on society. Consequently, research enabling specification and forecasting of hazardous space effects has become of great importance and urgency. This research requires studying the entire Sun-Earth system to understand the coupling of regions all the way from the source of disturbances in the solar atmosphere to the Earth's upper atmosphere. The traditional, region-based structure of research programs in Solar and Space physics is ill suited to fully support the change in research directions that the problem of space weather dictates. On the observational side, dense, distributed networks of observations are required to capture the full large-scale dynamics of the space environment. However, the cost of implementing these is typically prohibitive, especially for measurements in space. Thus, by necessity, the implementation of such new capabilities needs to build on creative and unconventional solutions. A particularly powerful idea is the utilization of new developments in data engineering and informatics research (big data). These new technologies make it possible to build systems that can collect and process huge amounts of noisy and inaccurate data and extract from them useful information. The shift in emphasis towards system level science for geospace also necessitates the development of large-scale and multi-scale models. The development of large-scale models capable of capturing the global dynamics of the Earth's space environment requires investment in research team efforts that go beyond what can typically be funded under the traditional grants programs. This calls for effective interdisciplinary collaboration and efficient leveraging of resources both nationally and internationally. This presentation will provide an overview of current and planned initiatives, programs, and activities at the National Science Foundation pertaining to space weathe research.

  10. Mentoring Faculty: Results from National Science Foundation's ADVANCE Program

    Science.gov (United States)

    Holmes, M. A.

    2015-12-01

    Faculty mentoring programs are common components of National Science Foundation ADVANCE awards. The ADVANCE program aims to increase the number of women on the faculty in science, technology, engineering and mathematics (STEM) departments through grants to individuals and to entire institutions. These grants target a change in institutional culture so that faculty from non-majority groups will succeed and thrive. Mentoring programs are generally designed to fit the particular institution(s) or target population (e.g., meteorologists at the beginning of their careers). A successful mentoring program makes the implicit knowledge necessary for faculty success explicit: policies and practices are made transparent; routes for finding answers are clarified or generated with faculty input; faculty overcome a sense of isolation and develop a community. Mentoring programs may be formal, with assigned mentors and mentees, or informal, with opportunities for beginning, middle and advanced career STEM faculty to mingle, generally over food and sometimes with a formal speaker. The programs are formally evaluated; in general, attention to mentoring generates better outcomes for all faculty. Research indicates that most successful scientists have a network of mentors rather than relying on one person to help navigate department, institution, and profession. The University of Nebraska-Lincoln's (UNL) award, ADVANCE-Nebraska, offered opportunities for faculty to informally network over luncheons with women speakers, advanced in their careers. We also offered after-hours networking receptions. In response to faculty feedback, we shifted to a series of panel discussions entitled "Conversations". Most panels were conducted by successful UNL faculty; about one-third had an outside expert on a given topic. Topics were chosen based on faculty feedback and targeted specifically to beginning faculty (How to Start Up a Lab; How to Balance Teaching and Writing), mid-career faculty (Putting

  11. The Fu Foundation School of Engineering & Applied Science - Columbia

    Science.gov (United States)

    Engineering Mechanics Computer Science Earth and Environmental Engineering Electrical Engineering Industrial Engineering & Applied Science - Columbia University Admissions Undergraduates Graduates Distance Learning Physics and Applied Mathematics Biomedical Engineering Chemical Engineering Civil Engineering and

  12. Social Science Boot Camp: Development and Assessment of a Foundational Course on Academic Literacy in the Social Sciences

    Science.gov (United States)

    Eaton, Judy; Long, Jennifer; Morris, David

    2018-01-01

    We developed a course, as part of our institution's core program, which provides students with a foundation in academic literacy in the social sciences: how to find, read, critically assess, and communicate about social science research. It is not a research methods course; rather, it is intended to introduce students to the social sciences and be…

  13. Understanding How Science Works: The Nature of Science as The Foundation for Science Teaching and Learning

    Science.gov (United States)

    McComas, William F.

    2017-01-01

    The nature of science (NOS) is a phrase used to represent the rules of the game of science. Arguably, NOS is the most important content issue in science instruction because it helps students understand the way in which knowledge is generated and validated within the scientific enterprise. This article offers a proposal for the elements of NOS that…

  14. "WALLS": Providing a Firm Foundation for Progression in Science.

    Science.gov (United States)

    Willis, Jo

    1997-01-01

    Describes a means for determining student knowledge in science. Written in student-level language, WALLS contains statements about science knowledge within bricks on a worksheet. Students shade in bricks they know or activities they have done and part-shade any they are unsure about, giving a differentiated starting point that allows them to plan…

  15. On What Foundation is Africa Building its Science and Technology ...

    African Journals Online (AJOL)

    In 2003, six African countries - Ghana Egypt, Tunisia, Morocco, Botswana and South Africa - participated in an international assessment programme in science and mathematics, called the Trends in International Mathematics and Science Study (TIMSS). The study examined the performance of eighth graders in mathematics ...

  16. Environmental Science and Research Foundation annual technical report: Calendar year 1996

    Energy Technology Data Exchange (ETDEWEB)

    Morris, R.C.; Blew, R.D. [eds.

    1997-07-01

    This Annual Technical Report describes work conducted for the Department of Energy, Idaho Operations Office (DOE-ID), by the Environmental Science and Research Foundation (Foundation). The Foundation`s mission to DOE-ID provides support in several key areas. The authors conduct an environmental monitoring and surveillance program over an area covering much of the upper Snake River Plain, and provide environmental education and support services related to Idaho National Engineering and Environmental Laboratory (INEEL) natural resource issues. Also, the Foundation, with its University Affiliates, conducts ecological and radioecological research in the Idaho National Environmental Research Park. This research benefits major DOE-ID programs including Waste Management, Environmental Restoration, Spent Nuclear Fuels, and Land Management Issues. The major accomplishments of the Foundation and its University Affiliates during the calendar year 1996 are discussed.

  17. Environmental Science and Research Foundation, Inc. annual technical report: Calendar year 1997

    Energy Technology Data Exchange (ETDEWEB)

    Reynolds, R.D.; Warren, R.W. [eds.

    1998-05-01

    This Annual Technical Report describes work conducted for the Department of Energy, Idaho Operations Office (DOE-ID), by the Environmental Science and Research Foundation (Foundation). The Foundation`s mission to DOE-ID provides support in several key areas. The Foundation conducts an environmental monitoring and surveillance program over an area covering much of the upper Snake River Plain, and provides environmental education and support services related to Idaho National Engineering and Environmental Laboratory (INEEL) natural resource issues. Also, the Foundation, with its University Affiliates, conducts ecological and radioecological research on the Idaho National Environmental Research Park. This research benefits major DOE-ID programs including Waste Management, Environmental Restoration, Spent Nuclear Fuels, and Land Management Issues. Summaries are included of the individual research projects.

  18. The logical foundations of forensic science: towards reliable knowledge

    OpenAIRE

    Evett, Ian

    2015-01-01

    The generation of observations is a technical process and the advances that have been made in forensic science techniques over the last 50 years have been staggering. But science is about reasoning—about making sense from observations. For the forensic scientist, this is the challenge of interpreting a pattern of observations within the context of a legal trial. Here too, there have been major advances over recent years and there is a broad consensus among serious thinkers, both scientific an...

  19. Laying the Foundations for Scientometric Research: A Data Science Approach

    Science.gov (United States)

    Perron, Brian E.; Victor, Bryan G.; Hodge, David R.; Salas-Wright, Christopher P.; Vaughn, Michael G.; Taylor, Robert Joseph

    2017-01-01

    Objective: Scientometric studies of social work have stagnated due to problems with the organization and structure of the disciplinary literature. This study utilized data science to produce a set of research tools to overcome these methodological challenges. Method: We constructed a comprehensive list of social work journals for a 25-year time…

  20. Informetrics needs a foundation in the theory of science

    DEFF Research Database (Denmark)

    Hjørland, Birger

    2016-01-01

    Taking the Kuhnian revolution in the philosophy of science as its point of departure, this chapter discusses the lessening influence of logical positivism as well as how the recognition of the subjectivity of the researcher, the social and historical nature of bibliometric patterns, and the impor...

  1. How to compare the social foundations of science culture: A trial with five cities in Korea.

    Science.gov (United States)

    Song, Jinwoong; Chung, Minkyung; Choi, Eunjeong; Kim, Leekyoung; Cho, Sook-Kyoung

    2013-01-01

    Though there have been several indicator systems to monitor the status quo of science and technology and of scientific literacy, few are especially designed for science culture, especially for its social dimension. Furthermore there is little agreement on how to measure it. In a previous study, an indicator system, SCI (Science Culture Indicators), had been developed to monitor the status quo of the science culture of a nation at both individual and social dimensions. The purpose of this study was to explore a practical way to measure and compare local cities' social foundation of science culture by revising and standardizing the social dimension of SCI and by applying it to five metropolitan cities in Korea. Despite some limits, the results of this study appear not only to reflect the cities' current situations but also to show the strength and weakness of their social foundation of science culture.

  2. Environmental Science and Research Foundation annual technical report: Calendar year 1996

    International Nuclear Information System (INIS)

    Morris, R.C.; Blew, R.D.

    1997-01-01

    This Annual Technical Report describes work conducted for the Department of Energy, Idaho Operations Office (DOE-ID), by the Environmental Science and Research Foundation (Foundation). The Foundation's mission to DOE-ID provides support in several key areas. The authors conduct an environmental monitoring and surveillance program over an area covering much of the upper Snake River Plain, and provide environmental education and support services related to Idaho National Engineering and Environmental Laboratory (INEEL) natural resource issues. Also, the Foundation, with its University Affiliates, conducts ecological and radioecological research in the Idaho National Environmental Research Park. This research benefits major DOE-ID programs including Waste Management, Environmental Restoration, Spent Nuclear Fuels, and Land Management Issues. The major accomplishments of the Foundation and its University Affiliates during the calendar year 1996 are discussed

  3. Environmental Science and Research Foundation, Inc. annual technical report: Calendar year 1997

    International Nuclear Information System (INIS)

    Reynolds, R.D.; Warren, R.W.

    1998-05-01

    This Annual Technical Report describes work conducted for the Department of Energy, Idaho Operations Office (DOE-ID), by the Environmental Science and Research Foundation (Foundation). The Foundation's mission to DOE-ID provides support in several key areas. The Foundation conducts an environmental monitoring and surveillance program over an area covering much of the upper Snake River Plain, and provides environmental education and support services related to Idaho National Engineering and Environmental Laboratory (INEEL) natural resource issues. Also, the Foundation, with its University Affiliates, conducts ecological and radioecological research on the Idaho National Environmental Research Park. This research benefits major DOE-ID programs including Waste Management, Environmental Restoration, Spent Nuclear Fuels, and Land Management Issues. Summaries are included of the individual research projects

  4. Educing Information - Interrogation: Science and Art, Foundations for the Future

    Science.gov (United States)

    2006-12-01

    imprisonment as an integral component of the inquisitor’s interrogation strategy…. [C]oupled if necessary, with hunger , shackles, and torture…[it...computer science with a concentration in machine intelligence and cognition, and minors in neuropsychology and developmental psychology, from The George...a solid theoretical base, then a signifi cant research investment into the underlying neuropsychological mechanisms of deception must be made before

  5. Senator Fred Harris's National Social Science Foundation proposal: Reconsidering federal science policy, natural science-social science relations, and American liberalism during the 1960s.

    Science.gov (United States)

    Solovey, Mark

    2012-03-01

    During the 1960s, a growing contingent of left-leaning voices claimed that the social sciences suffered mistreatment and undue constraints within the natural science-dominated federal science establishment. According to these critics, the entrenched scientific pecking order in Washington had an unreasonable commitment to the unity of the sciences, which reinforced unacceptable inequalities between the social and the natural sciences. The most important political figure who advanced this critique, together with a substantial legislative proposal for reform, was the Oklahoma Democratic Senator Fred Harris. Yet histories of science and social science have told us surprisingly little about Harris. Moreover, existing accounts of his effort to create a National Social Science Foundation have misunderstood crucial features of this story. This essay argues that Harris's NSSF proposal developed into a robust, historically unique, and increasingly critical liberal challenge to the post-World War II federal science establishment's treatment of the social sciences as "second-class citizens."

  6. Environmental Science and Research Foundation. Annual technical report, April 11, 1994--December 31, 1994

    International Nuclear Information System (INIS)

    Reynolds, T.D.; Morris, R.C.; Markham, O.D.

    1995-06-01

    This Annual Technical Report describes work conducted for the Department of Energy, Idaho Operations Office, by the Environmental Science and Research Foundation (Foundation) for work under contract DE-AC07-94ID13268. The Foundation began, on April 11, 1994, to conduct environmental surveillance near to and distant from the Idaho National Engineering Laboratory, provide environmental public relations and education related to INEL natural resource issues, and conduct ecological and radioecological research benefiting major DOE-ID programs including Waste Management, Environmental Restoration, Spent Nuclear Fuels, and Infrastructure

  7. Environmental Science and Research Foundation. Annual technical report, April 11, 1994--December 31, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Reynolds, T.D.; Morris, R.C.; Markham, O.D. [eds.

    1995-06-01

    This Annual Technical Report describes work conducted for the Department of Energy, Idaho Operations Office, by the Environmental Science and Research Foundation (Foundation) for work under contract DE-AC07-94ID13268. The Foundation began, on April 11, 1994, to conduct environmental surveillance near to and distant from the Idaho National Engineering Laboratory, provide environmental public relations and education related to INEL natural resource issues, and conduct ecological and radioecological research benefiting major DOE-ID programs including Waste Management, Environmental Restoration, Spent Nuclear Fuels, and Infrastructure.

  8. Swiss Life Sciences - a science communication project for both schools and the wider public led by the foundation Science et Cité.

    Science.gov (United States)

    Röthlisberger, Michael

    2012-01-01

    The foundation Science et Cité was founded 1998 with the aim to inform the wider Swiss public about current scientific topics and to generate a dialogue between science and society. Initiated as an independent foundation by the former State Secretary for Science and Research, Dr. Charles Kleiber, Science et Cité is now attached to the Swiss Academies of Arts and Sciences as a competence center for dialogue with the public. Due to its branches in all language regions of the country, the foundation is ideally suited to initiate and implement communication projects on a nationwide scale. These projects are subdivided into three categories: i) science communication for children/adolescents, ii) establishing a dialogue between science and the wider public, and iii) conducting the role of a national center of competence and networking in science communication. Swiss Life Sciences is a project that fits into all of these categories: a year-round program for schools is complemented with an annual event for the wider public. With the involvement of most of the major Swiss universities, the Swiss National Science Foundation, the foundation Gen Suisse and many other partners, Swiss Life Sciences also sets an example of national networking within the science communication community.

  9. Advanced Technologies and Instrumentation at the National Science Foundation

    Science.gov (United States)

    Kurczynski, Peter; Neff, James E.

    2018-01-01

    Over its more than thirty-year history, the Advanced Technologies and Instrumentation (ATI) program within the Division of Astronomical Sciences has provided grants to support the development and deployment of detectors and instrumentation for ground-based astronomy. This program has enabled scientific advances in diverse fields from solar physics to exoplanets to cosmology. ATI has provided instrumentation for both small and large observatories from radio through visible wavebands. It has played a role in the early development of major initiatives such as the Large Synoptic Survey Telescope. Technology development for astronomy unfolds over a longer period than the lifetime of a single grant. This review will consider ATI from an historical perspective to assess its impact on astronomy.

  10. Arthritis Foundation

    Science.gov (United States)

    ... Vision Leadership News Partners & Sponsors Careers Code of Ethics Financials Annual Report Contact Us Privacy Policy Terms & Conditions Donate Press Store Blog Community Local Offices Kids Get Arthritis Too Español Arthritis Today Social Media Newsletters Sign Up for E-Newsletters Arthritis Foundation ...

  11. [Funding for Division of Microbiology in 2014 by National Natural Science Foundation of China].

    Science.gov (United States)

    Qiao, Jianjun; Huang, Chenyang; Liu, Lin; Wen, Mingzhang

    2015-02-04

    In this paper, we provided an overview of proposals submitted and projects funded in 2014 at the Division of Microbiology, Department of Life Sciences, National Natural Science Foundation of China. The traits and problems in different sub-disciplines were analyzed, the background, results and analysis of internet voting before panel meetings in Microbiology discipline were also introduced. The information will provide references for Chinese researchers to apply funding in microbiology discipline in the future.

  12. Community College Economics Instruction: Results from a National Science Foundation Project

    Science.gov (United States)

    Maier, Mark; Chi, W. Edward

    2016-01-01

    The principal investigator of a National Science Foundation project, "Economics at Community Colleges," surveyed community college economics faculty and organized workshops, webinars, and regional meetings to address community college faculty isolation from new ideas in economics and economics instruction. Survey results, combined with…

  13. Charitable Foundation for Education and Science as a channel of funding of universities in Germany

    Directory of Open Access Journals (Sweden)

    Kadikina Anastasiia Aleksandrovna

    2013-09-01

    Full Text Available The legal, organizational and financial characteristics of charitable foundations of Germany are explored in the paper. The funds for the support of education and science as an additional channel of the financial provision of higher education are considered. Emphasizes the importance of the development of various forms and methods of financing of higher education through extra-budgetary sources.

  14. 76 FR 3853 - National Science Foundation Rules of Practice and Statutory Conflict-of-Interest Exemptions

    Science.gov (United States)

    2011-01-21

    ... Practice and Statutory Conflict-of-Interest Exemptions AGENCY: National Science Foundation. ACTION: Final... provisions concerning statutory conflict-of- interest exemptions. DATES: The final rule is effective on.... List of Subjects in 45 CFR Part 680 Conflict of interests. Accordingly, 45 CFR part 680 is amended as...

  15. 77 FR 12331 - Membership of National Science Foundation's Senior Executive Service Performance Review Board

    Science.gov (United States)

    2012-02-29

    ... Director, Division of Human Resource Management, National Science Foundation, Room 315, 4201 Wilson... Resource Management and Chief Human Capital Officer. Deborah F. Lockhart, Deputy Director, Division of.... Sunley, Director, Division of Human Resource Management and PRB Executive Secretary. Dated: February 21...

  16. 25 October 2017- Austrian, German and Swiss Science Foundations signing the guest book in the Globe of Science and Innovation

    CERN Multimedia

    Ordan, Julien Marius

    2017-01-01

    Austrian, German and Swiss Science Foundations in Globe: Professor Klement Tockner, Präsident, Fonds zur Förderung der wissenschaftlichen Forschung, Austria; Professor Peter, Strohschneider, Präsident, Deutsche Forschungsgemeinschaft Germany; Professor Matthias Egger, Präsident, Schweizerischer Nationalfonds zur Förderung der Wissenschaftlichen Forschung, Switzerland

  17. The Taskforce on Conceptual Foundations of Earth System Governance: Sustainability Science

    Directory of Open Access Journals (Sweden)

    Barry Ness

    2017-02-01

    Full Text Available We are pleased to introduce the second special issue from Challenges in Sustainability, this time as a part of the Taskforce on Conceptual Foundations of Earth System Governance, an initiative by the Earth System Governance Project (ESG (http://www.earthsystemgovernance.net/conceptual-foundations/. The ESG Project is a global research alliance. It is the largest social science research network in the field of governance and global environmental change. ESG is primarily a scientific effort but is also designed to assist policy responses to pressing problems of earth system transformation.

  18. 45 CFR 630.400 - What are my responsibilities as a(n) National Science Foundation awarding official?

    Science.gov (United States)

    2010-10-01

    ....400 What are my responsibilities as a(n) National Science Foundation awarding official? As a(n... 45 Public Welfare 3 2010-10-01 2010-10-01 false What are my responsibilities as a(n) National Science Foundation awarding official? 630.400 Section 630.400 Public Welfare Regulations Relating to...

  19. The art and science of selecting graduate students in the biomedical sciences: Performance in doctoral study of the foundational sciences.

    Science.gov (United States)

    Park, Hee-Young; Berkowitz, Oren; Symes, Karen; Dasgupta, Shoumita

    2018-01-01

    The goal of this study was to investigate associations between admissions criteria and performance in Ph.D. programs at Boston University School of Medicine. The initial phase of this project examined student performance in the classroom component of a newly established curriculum named "Foundations in Biomedical Sciences (FiBS)". Quantitative measures including undergraduate grade point average (GPA), graduate record examination (GRE; a standardized, computer-based test) scores for the verbal (assessment of test takers' ability to analyze, evaluate, and synthesize information and concepts provided in writing) and quantitative (assessment of test takers' problem-solving ability) components of the examination, previous research experience, and competitiveness of previous research institution were used in the study. These criteria were compared with competencies in the program defined as students who pass the curriculum as well as students categorized as High Performers. These data indicated that there is a significant positive correlation between FiBS performance and undergraduate GPA, GRE scores, and competitiveness of undergraduate institution. No significant correlations were found between FiBS performance and research background. By taking a data-driven approach to examine admissions and performance, we hope to refine our admissions criteria to facilitate an unbiased approach to recruitment of students in the life sciences and to share our strategy to support similar goals at other institutions.

  20. The Ford Foundation and the rise of behavioralism in political science.

    Science.gov (United States)

    Hauptmann, Emily

    2012-01-01

    How did behavioralism, one of the most influential approaches to the academic study of politics in the twentieth century, become so prominent so quickly? I argue that many political scientists have either understated or ignored how the Ford Foundation's Behavioral Sciences Program gave form to behavioralism, accelerated its rise, and helped root it in political science. I then draw on archived documents from Ford as well as one of its major grantees, U. C. Berkeley, to present several examples of how Ford used its funds to encourage the behavioral approach at a time when it had few adherents among political scientists. © 2012 Wiley Periodicals, Inc.

  1. Normative ethics does not need a foundation: it needs more science.

    Science.gov (United States)

    Quintelier, Katinka; Van Speybroeck, Linda; Braeckman, Johan

    2011-03-01

    The impact of science on ethics forms since long the subject of intense debate. Although there is a growing consensus that science can describe morality and explain its evolutionary origins, there is less consensus about the ability of science to provide input to the normative domain of ethics. Whereas defenders of a scientific normative ethics appeal to naturalism, its critics either see the naturalistic fallacy committed or argue that the relevance of science to normative ethics remains undemonstrated. In this paper, we argue that current scientific normative ethicists commit no fallacy, that criticisms of scientific ethics contradict each other, and that scientific insights are relevant to normative inquiries by informing ethics about the options open to the ethical debate. Moreover, when conceiving normative ethics as being a nonfoundational ethics, science can be used to evaluate every possible norm. This stands in contrast to foundational ethics in which some norms remain beyond scientific inquiry. Finally, we state that a difference in conception of normative ethics underlies the disagreement between proponents and opponents of a scientific ethics. Our argument is based on and preceded by a reconsideration of the notions naturalistic fallacy and foundational ethics. This argument differs from previous work in scientific ethics: whereas before the philosophical project of naturalizing the normative has been stressed, here we focus on concrete consequences of biological findings for normative decisions or on the day-to-day normative relevance of these scientific insights.

  2. INSTRUMENTS OF SUPPORT FOR RESEARCH AND DEVELOPMENT FUNDED BY LEADING DOMESTIC AND INTERNATIONAL SCIENCE FOUNDATIONS

    Directory of Open Access Journals (Sweden)

    Irina E. Ilina

    2017-06-01

    Full Text Available Introduction: one of the key aspects of the knowledge economy development is the growing significance of the results of research and development. The education and basic research play a key role in this process. Funding for education and fundamental science is carried out mainly at the expense of the state resources, including a system of foundations for scientific, engineering and innovation activities in Russia. The purpose of this article is to present recommendations for improving the tools of domestic foundations in funding fundamental research and development, including education and training. The propositions are made with a comparative analysis of the domestic and foreign science foun dations’ activities. Materials and Methods: the authors used analysis, comparison, induction, deduction, graphical analysis, generalisation and other scientific methods during the study. Results: the lack of comparability between domestic and foreign scientific funds in the volume of funding allocated for basic research and development is revealed. This situation affects the scientific research. The foreign foundations have a wide range of instruments to support research projects at all stages of the life cycle of grants for education and training prior to release of an innovative product to market (the use of “innovation elevator” system. The Russian national scientific foundations have no such possibilities. The authors guess that the Russian organisations ignore some of the instruments for supporting research and development. Use of these tools could enhance the effectiveness of research projects. According to the study of domestic and foreign experience in supporting research and development, the authors proposed a matrix composed of instruments for support in the fields of basic scientific researches and education with such phases of the project life cycle as “research” and “development”. Discussion and Conclusions: the foreign science

  3. Anatomical sciences: A foundation for a solid learning experience in dental technology and dental prosthetics.

    Science.gov (United States)

    Bakr, Mahmoud M; Thompson, C Mark; Massadiq, Magdalena

    2017-07-01

    Basic science courses are extremely important as a foundation for scaffolding knowledge and then applying it in future courses, clinical situations as well as in a professional career. Anatomical sciences, which include tooth morphology, oral histology, oral embryology, and head and neck anatomy form a core part of the preclinical courses in dental technology programs. In this article, the importance and relevance of anatomical sciences to dental personnel with no direct contact with patients (dental technicians) and limited discipline related contact with patients (dental prosthetists) is highlighted. Some light is shed on the role of anatomical sciences in the pedagogical framework and its significance in the educational process and interprofessional learning of dental technicians and prosthetists using oral biology as an example in the dental curriculum. To conclude, anatomical sciences allow dental technicians and prosthetists to a gain a better insight of how tissues function, leading to a better understanding of diagnosis, comprehensive treatment planning and referrals if needed. Patient communication and satisfaction also increases as a result of this deep understanding of oral tissues. Anatomical sciences bridge the gap between basic science, preclinical, and clinical courses, which leads to a holistic approach in patient management. Finally, treatment outcomes are positively affected due to the appreciation of the macro and micro structure of oral tissues. Anat Sci Educ 10: 395-404. © 2016 American Association of Anatomists. © 2016 American Association of Anatomists.

  4. Public science policy and administration. [cooperation of government industry, foundations, and educational institutions

    Science.gov (United States)

    Rosenthal, A. H. (Editor)

    1973-01-01

    Science, the overwhelming concern of our time, is no longer a matter of private research and development but one of public policy and administration, in which government, industry, foundations, and educational institutions must all work together as never before. Few other single tasks are of such decisive importance to the collective and individual welfare of American citizens as the formulation of public science policy and the administration of scientific programs. Eleven national authorities of varied background in science, education, and government administration contribute their experience and their judgment in an effort to deal with the major aspects of the subject. Their focus is on the meeting of actual problems; they consider the decision making process in both public and public-private organizations. Topics are grouped in three general categories: personnel needs and resources, organizational problems and techniques, and the administrative role in policy leadership.

  5. Teaching Development of Foundation Environmental Science Course Using Undergraduate Handbook of Buriram Rajabhat University

    Directory of Open Access Journals (Sweden)

    Kuntida Thammamrat

    2017-06-01

    Full Text Available The present study is an attempt to apply the handbook as a tool for teaching foundation of environmental science. The aims of this investigation were 1 to develop a course handbook that fills the standard criteria of 80/80 2 to compare mean derived from pretest and posttest scores 3 to compare student’s attitude toward environmental science from the pretest and posttest scores and 4 to compare student’s environmental scientific skills prior to and after using a study handbook. The key informants were 56 students drawn from 1st- year students of Environmental Science Department of Buriram Rajabhat University in 2558 (B.E academic year. Four instruments of data collection were constructed including 1 the course handbook 2 test of student’s basic knowledge on environmental science, 3 the test of student’s attitude toward environmental science, and 4 the test of student’s environmental scientific skills. The statistics analysis in this study comprised frequency percentage, mean, standard deviation and dependent t – test, which were of used for examining the hypothesis. The findings of this investigation revealed that 1 the efficiency of the handbook entitled “Foundation of environmental science” met the criteria of 80/80 in all aspects with value 83.93/91.81 2 the scores derived from student’s posttest is higher than pretest with .05 statistical significant difference 3 teaching through the handbook enhanced the level of student attitude toward environmental science with .05 statistical significant difference and 4 the environmental scientific skills of the students learning through the handbook are significantly higher than before, at .05 level.

  6. Lessons learned from a privacy breach at an academic health science centre.

    Science.gov (United States)

    Malonda, Jacqueline; Campbell, Janice; Crivianu-Gaita, Daniela; Freedman, Melvin H; Stevens, Polly; Laxer, Ronald M

    2009-01-01

    In 2007, the Hospital for Sick Children experienced a serious privacy breach when a laptop computer containing the personal health information of approximately 3,000 patients and research subjects was stolen from a physician-researcher's vehicle. This incident was reported to the information and privacy commissioner of Ontario (IPC). The IPC issued an order that required the hospital to examine and revise its policies, practices and research protocols related to the protection of personal health information and to educate staff on privacy-related matters.

  7. An Analysison Provincial Medical Science Basic Research Competitiveness Based on the National Natural Science Foundation of China

    Directory of Open Access Journals (Sweden)

    Xing Xia

    2017-06-01

    Full Text Available [Purpose/significance] The National Natural Science Foundation of China (NSFC is one of the most important channels to support basic research in China. Competition for funding by the NSFC has been a very important indicator to measure the basic research level of various province and scientific research institutions. [Method/process] By combing and analyzing the status quo of NSFC in medical science, it is helpful to narrow the provincial gap and improve the basic research of medical science in China. Based on the project information of NSFC and previous scholars’ research, the paper update the index of basic research competitiveness, and analyzes project number and project funding of medical science during 2006-2016. At the same time, the competitiveness of medical science basic research and its changing trend in 31 provinces of China are analyzed. [Result/conclusion] The result shows that, in recent years, China’s basic scientific research has greatly improved, but there is a large gap between the provinces.

  8. Eclecticism as the foundation of meta-theoretical, mixed methods and interdisciplinary research in social sciences.

    Science.gov (United States)

    Kroos, Karmo

    2012-03-01

    This article examines the value of "eclecticism" as the foundation of meta-theoretical, mixed methods and interdisciplinary research in social sciences. On the basis of the analysis of the historical background of the concept, it is first suggested that eclecticism-based theoretical scholarship in social sciences could benefit from the more systematic research method that has been developed for synthesizing theoretical works under the name metatheorizing. Second, it is suggested that the mixed methods community could base its research approach on philosophical eclecticism instead of pragmatism because the basic idea of eclecticism is much more in sync with the nature of the combined research tradition. Finally, the Kuhnian frame is used to support the argument for interdisciplinary research and, hence, eclecticism in social sciences (rather than making an argument against multiple paradigms). More particularly, it is suggested that integrating the different (inter)disciplinary traditions and schools into one is not necessarily desirable at all in social sciences because of the complexity and openness of the research field. If it is nevertheless attempted, experience in economics suggests that paradigmatic unification comes at a high price.

  9. Using Decision Tree Analysis to Understand Foundation Science Student Performance. Insight Gained at One South African University

    Science.gov (United States)

    Kirby, Nicola Frances; Dempster, Edith Roslyn

    2014-01-01

    The Foundation Programme of the Centre for Science Access at the University of KwaZulu-Natal, South Africa provides access to tertiary science studies to educationally disadvantaged students who do not meet formal faculty entrance requirements. The low number of students proceeding from the programme into mainstream is of concern, particularly…

  10. Projects of Earth Sciences Supported by National Natural Science Foundation of China

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    information please contract: Director Song Changqing, Dr. Leng Shuying, Division of Geography, National Natural Science Foundation of China. P.O.Box 8610, Beijing, 100085, China. E-mail:Songcq@nsfc.gov.cn. Lengsy@mail.nsfc.gov.cn

  11. Foundations in Science and Mathematics Program for Middle School and High School Students

    Science.gov (United States)

    Desai, Karna Mahadev; Yang, Jing; Hemann, Jason

    2016-01-01

    The Foundations in Science and Mathematics (FSM) is a graduate student led summer program designed to help middle school and high school students strengthen their knowledge and skills in mathematics and science. FSM provides two-week-long courses over a broad spectrum of disciplines including astronomy, biology, chemistry, computer programming, geology, mathematics, and physics. Students can chose two types of courses: (1) courses that help students learn the fundamental concepts in basic sciences and mathematics (e.g., "Precalculus"); and (2) knowledge courses that might be excluded from formal schooling (e.g., "Introduction to Universe"). FSM has served over 500 students in the Bloomington, IN, community over six years by acquiring funding from Indiana University and the Indiana Space Grant Consortium. FSM offers graduate students the opportunity to obtain first hand experience through independent teaching and curriculum design as well as leadership experience.We present the design of the program, review the achievements, and explore the challenges we face. We are open to collaboration with similar educational outreach programs. For more information, please visit http://www.indiana.edu/~fsm/ .

  12. Theoretical foundation, goals, and methodology of a new science--biospherics

    Science.gov (United States)

    Shaffer, J A

    1994-01-01

    Scientific endeavor is motivated by mankind's needs, desires, and inherent nature to explore. The history of scientific revolutions involves paradigmatic breakthroughs that uncover previously unknown perspectives by which a phenomenon can be viewed. In this issue a noted scientist, Nickolai Pechurkin, gives a seminal brief on the theoretical foundation, goals, and methodology leading to a new science--biospherics. While biospherics has so far eluded a simple definition, it is not something taken from "whole cloth." Biospherics has many antecedents, but most noticeably arises from the global scale research and theory associated with the technological advances of the Space-Age. The Space-Age also created the need for totally closed life-support systems which involve experimentation with artificial biospheres.

  13. [Analysis of projects of schistosomiasis sponsored by National Science Foundation of China].

    Science.gov (United States)

    Wen-di, Zhou; Liang, Shi; Xue-Dan, Ke; Jie, Wang

    2017-07-27

    To summarize the present development by analysis of projects in schistosomiasis funded by National Science Foundation of China (NSFC). Based on the ISIS database of NFSC, the projects in the studies of schistosomiasis from 2005 to 2016 were analyzed. The distributions of sponsored numbers, amounts, types, agencies, disciplines and changes in research topics by means of network profiles were described. During the study period, 198 projects were funded by NSFC totally with 76.05 million yuan in which the general and youth projects were main types. The main sponsored agencies were research institutes and medical colleges. The top three fields sponsored were medical pathogenic microbes and infection, veterinary and medical immunology. The funding on schistosomiasis researches has a downward trend, but studies are continuing in depth. In this situation, innovative and interdisciplinary researches need to be encouraged to promote the development of schistosomiasis.

  14. Monitoring the southwestern Wyoming landscape—A foundation for management and science

    Science.gov (United States)

    Manier, Daniel J.; Anderson, Patrick J.; Assal, Timothy J.; Chong, Geneva W.; Melcher, Cynthia P.

    2017-08-29

    Natural resource monitoring involves repeated collections of resource condition data and analyses to detect possible changes and identify underlying causes of changes. For natural resource agencies, monitoring provides the foundation for management and science. Specifically, analyses of monitoring data allow managers to better understand effects of land-use and other changes on important natural resources and to achieve their conservation and management goals. Examples of natural resources monitored on public lands include wildlife habitats, plant productivity, animal movements and population trends, soil chemistry, and water quality and quantity. Broader definitions of monitoring also recognize the need for scientifically valid data to help support planning efforts and informed decisions, to develop adaptive management strategies, and to provide the means for evaluating management outcomes.

  15. Emphaty as the foundation of the social sciences and of social life: a reading of Husserl's phenomenology of transcendental intersubjectivity

    Directory of Open Access Journals (Sweden)

    Frédéric Vandenberghe

    2002-12-01

    Full Text Available Starting with an overview of possible solutions to the problem of social order, the author presents a non-acritical reconstruction of Edmund Husserl's transcendental phenomenology of intersubjectivity as a sympathetic alternative to Habermas's theory of communicative action. By means of a detailed analysis of the concept of empathy (Einfühlung, he shows that Husserl's phenomenology of intersubjectivity offers a triple foundation of the sciences. As a warrant of the objectivity of the world, it grounds the natural sciences; as a presupposition of sociality, it founds the social sciences; as mediated by culture, it grounds the social sciences as human sciences.

  16. Privacy Policy

    Science.gov (United States)

    ... Home → NLM Privacy Policy URL of this page: https://medlineplus.gov/privacy.html NLM Privacy Policy To ... out of cookies in the most popular browsers, http://www.usa.gov/optout_instructions.shtml. Please note ...

  17. Conventional Principles in Science: On the foundations and development of the relativized a priori

    Science.gov (United States)

    Ivanova, Milena; Farr, Matt

    2015-11-01

    The present volume consists of a collection of papers originally presented at the conference Conventional Principles in Science, held at the University of Bristol, August 2011, which featured contributions on the history and contemporary development of the notion of 'relativized a priori' principles in science, from Henri Poincaré's conventionalism to Michael Friedman's contemporary defence of the relativized a priori. In Science and Hypothesis, Poincaré assessed the problematic epistemic status of Euclidean geometry and Newton's laws of motion, famously arguing that each has the status of 'convention' in that their justification is neither analytic nor empirical in nature. In The Theory of Relativity and A Priori Knowledge, Hans Reichenbach, in light of the general theory of relativity, proposed an updated notion of the Kantian synthetic a priori to account for the dynamic inter-theoretic status of geometry and other non-empirical physical principles. Reichenbach noted that one may reject the 'necessarily true' aspect of the synthetic a priori whilst preserving the feature of being constitutive of the object of knowledge. Such constitutive principles are theory-relative, as illustrated by the privileged role of non-Euclidean geometry in general relativity theory. This idea of relativized a priori principles in spacetime physics has been analysed and developed at great length in the modern literature in the work of Michael Friedman, in particular the roles played by the light postulate and the equivalence principle - in special and general relativity respectively - in defining the central terms of their respective theories and connecting the abstract mathematical formalism of the theories with their empirical content. The papers in this volume guide the reader through the historical development of conventional and constitutive principles in science, from the foundational work of Poincaré, Reichenbach and others, to contemporary issues and applications of the

  18. 78 FR 3019 - Privacy Act of 1974; Science & Technology Directorate-001 Research, Development, Test, and...

    Science.gov (United States)

    2013-01-15

    ...: Understand the motivations and behaviors of terrorists, individuals that engage in violent or criminal... behavior changes in a detectable manner when he or she is being deceitful, and then design a research... personal privacy. Disclosure to consumer reporting agencies: None. Policies and practices for storing...

  19. Longitudinal Nanotechnology Development (1991-2002): National Science Foundation Funding and its Impact on Patents

    International Nuclear Information System (INIS)

    Huang Zan; Chen Hsinchun; Yan Lijun; Roco, Mihail C.

    2005-01-01

    Nanotechnology holds the promise to revolutionize a wide range of products, processes and applications. It is recognized by over sixty countries as critical for their development at the beginning of the 21st century. A significant public investment of over $1 billion annually is devoted to nanotechnology research in the United States. This paper provides an analysis of the National Science Foundation (NSF) funding of nanoscale science and engineering (NSE) and its relationship to the innovation as reflected in the United States Patent and Trade Office (USPTO) patent data. Using a combination of bibliometric analysis and visualization tools, we have identified several general trends, the key players, and the evolution of technology topics in the NSF funding and commercial patenting activities. This study documents the rapid growth of innovation in the field of nanotechnology and its correlation to funding. Statistical analysis shows that the NSF-funded researchers and their patents have higher impact factors than other private and publicly funded reference groups. This suggests the importance of fundamental research on nanotechnology development. The number of cites per NSF-funded inventor is about 10 as compared to 2 for all inventors of NSE-related patents recorded at USPTO, and the corresponding Authority Score is 20 as compared to 1.8

  20. Longitudinal Nanotechnology Development (1991-2002): National Science Foundation Funding and its Impact on Patents

    Energy Technology Data Exchange (ETDEWEB)

    Huang Zan, E-mail: zhuang@eller.arizona.edu; Chen Hsinchun; Yan Lijun [University of Arizona, Department of Management Information Systems, Artificial Intelligence Lab, Eller College of Management (United States); Roco, Mihail C. [National Science Foundation (United States)

    2005-10-15

    Nanotechnology holds the promise to revolutionize a wide range of products, processes and applications. It is recognized by over sixty countries as critical for their development at the beginning of the 21st century. A significant public investment of over $1 billion annually is devoted to nanotechnology research in the United States. This paper provides an analysis of the National Science Foundation (NSF) funding of nanoscale science and engineering (NSE) and its relationship to the innovation as reflected in the United States Patent and Trade Office (USPTO) patent data. Using a combination of bibliometric analysis and visualization tools, we have identified several general trends, the key players, and the evolution of technology topics in the NSF funding and commercial patenting activities. This study documents the rapid growth of innovation in the field of nanotechnology and its correlation to funding. Statistical analysis shows that the NSF-funded researchers and their patents have higher impact factors than other private and publicly funded reference groups. This suggests the importance of fundamental research on nanotechnology development. The number of cites per NSF-funded inventor is about 10 as compared to 2 for all inventors of NSE-related patents recorded at USPTO, and the corresponding Authority Score is 20 as compared to 1.8.

  1. Scientific foundation of regulating ionizing radiation: application of metrics for evaluation of regulatory science information.

    Science.gov (United States)

    Moghissi, A Alan; Gerraa, Vikrham Kumar; McBride, Dennis K; Swetnam, Michael

    2014-11-01

    This paper starts by describing the historical evolution of assessment of biologic effects of ionizing radiation leading to the linear non-threshold (LNT) system currently used to regulate exposure to ionizing radiation. The paper describes briefly the concept of Best Available Science (BAS) and Metrics for Evaluation of Scientific Claims (MESC) derived for BAS. It identifies three phases of regulatory science consisting of the initial phase, when the regulators had to develop regulations without having the needed scientific information; the exploratory phase, when relevant tools were developed; and the standard operating phase, when the tools were applied to regulations. Subsequently, an attempt is made to apply the BAS/MESC system to various stages of LNT. This paper then compares the exposure limits imposed by regulatory agencies and also compares them with naturally occurring radiation at several cities. Controversies about LNT are addressed, including judgments of the U.S. National Academies and their French counterpart. The paper concludes that, based on the BAS/MESC system, there is no disagreement between the two academies on the scientific foundation of LNT; instead, the disagreement is based on their judgment or speculation.

  2. [Review and analysis of transplant biological research projects funded by National Natural Science Foundation of China].

    Science.gov (United States)

    Gong, Weihua; Sun, Ruijuan; Dong, Erdan

    2015-08-01

    To study the funding and achievements in the field of organ transplantation support by the National Natural Science Foundation of China (NSFC). A search of NSFC database was made by using the key word "transplantation" and excluding "bone marrow transplantation" for the projects funded between 1988 and 2013. SCI indexed publications that marked with NSFC project number were collected by searching each grant number in the database of the Web of Science. Six hundreds fifty-five projects were identified and received about 220 million yuan in grant funding. These funded research projects were distributed among 25 provinces and autonomous regions, however, which were mainly in the developed coastal areas; of them, 43 (6.56%) projects were granted in xenotransplantation and 17 projects (2.60%) were funded in the field of traditional Chinese medicine-related organ transplantation; Transplantation on blood vessels, heart, kidney, liver, lung, small intestine, pancreatic, cornea, trachea, skin, etc. were primarily performed in research. Nine hundreds and sixty-one SCI-indexed publications were achieved. Magnitude and intensity of NSFC funding, output of SCI publications have been increasing, suggesting that NSFC positively promotes the development of organ transplantation. Although a great progress of transplantation has been made, basic and translational studies should be vigorously strengthened.

  3. Advancing Earth System Science Literacy and Preparing the Future Geoscience Workforce Through Strategic Investments at the National Science Foundation (Invited)

    Science.gov (United States)

    Karsten, J. L.; Patino, L. C.; Rom, E. L.; Weiler, C. S.

    2010-12-01

    The National Science Foundation (NSF) is an independent federal agency created 60 years ago by the U.S. Congress "to promote the progress of science; to advance the national health, prosperity, and welfare; to secure the national defense…" NSF is the primary funding agency in the U.S. to support basic, frontier research across all fields in science, engineering, and education, except for medical sciences. With a FY 2011 budget request of more than $955 million, the NSF Directorate for Geosciences (GEO) is the principle source of federal funding for university-based fundamental research in the geosciences and preparation of the next generation of geoscientists. Since its inception, GEO has supported the education and training of a diverse and talented pool of future scientists, engineers, and technicians in the Earth, Ocean, Atmospheric and Geospatial Sciences sub-fields, through support of graduate research assistants, post-doctoral fellows, and undergraduate research experiences. In the late 1990’s and early 2000’s, GEO initiated several programs that expanded these investments to also support improvements in pre-college and undergraduate geoscience education through a variety of mechanisms (e.g., professional development support for K-12 teachers, development of innovative undergraduate curricula, and scientist-mentored research experiences for elementary and secondary students). In addition to GEO’s Geoscience Education (GeoEd), Opportunities for Enhancing Diversity in the Geosciences (OEDG), Global Learning and Observations to Benefit the Environment (GLOBE), and Geoscience Teacher Training (GEO-Teach) programs, GEO participates in a number of cross-Foundation programs, including the Research Experiences for Undergraduates (REU), Integrative Graduate Education and Research Traineeship (IGERT), Ethics Education in Science and Engineering (EESE), NSF Graduate STEM Fellows in K-12 Education (GK-12), and Partnerships for International Research and Education

  4. Life after National Science Foundation fellowships: The implications for a graduate student's professional endeavors

    Science.gov (United States)

    Obarski, Kelly Josephine

    Each year, hundreds of graduate and undergraduate students, participate as Fellows in National Science Foundation GK-12 Grants throughout the U.S. These Fellowships create opportunities for university students to improve their communication skills, teaching proficiencies, and team-building skills, in addition to expanding their interest in educational endeavors in their respective communities while pursuing their college degrees. STEP (Science and Technology Enhancement Project) is one such project. University faculty, public school teachers, and community leaders collaborated together in order to bring scientists into middle and secondary classrooms to focus on increasing student interest and proficiency in science, technology, engineering, and mathematics (STEM) skills. Seventeen Fellows, in the previous four years, designed, developed, and implemented innovative, hands-on lessons in seven local schools. The evaluation team collected a tremendous amount of research evidence focused on the effect of the program on the Fellows while they were participants in the study, but there has been very little data collected about the Fellows after leaving the program. This research study, consisting of two-hour interviews, qualitatively explores how the skills learned while participating in the STEP program affected the Fellows' career and educational choices once leaving the project. This data was analyzed along with historical attitude surveys and yearly tracking documents to determine the effect that participation in the program had on their choices post-STEP. An extensive literature review has been conducted focusing on other GK-12 programs throughout the country, K-16 collaboration, Preparing Future Faculty Programs, as well as on teaching and learning literature. These bodies of literature provide the theoretical basis in which the research is framed in order to assess the impact on Fellow educational and professional choices since leaving the STEP program. This

  5. Improving Undergraduate STEM Education: Pathways into Geoscience (IUSE: GEOPATHS) - A National Science Foundation Initiative

    Science.gov (United States)

    Jones, B.; Patino, L. C.

    2016-12-01

    Preparation of the future professional geoscience workforce includes increasing numbers as well as providing adequate education, exposure and training for undergraduates once they enter geoscience pathways. It is important to consider potential career trajectories for geoscience students, as these inform the types of education and skill-learning required. Recent reports have highlighted that critical thinking and problem-solving skills, spatial and temporal abilities, strong quantitative skills, and the ability to work in teams are among the priorities for many geoscience work environments. The increasing focus of geoscience work on societal issues (e.g., climate change impacts) opens the door to engaging a diverse population of students. In light of this, one challenge is to find effective strategies for "opening the world of possibilities" in the geosciences for these students and supporting them at the critical junctures where they might choose an alternative pathway to geosciences or otherwise leave altogether. To address these and related matters, The National Science Foundation's (NSF) Directorate for Geosciences (GEO) has supported two rounds of the IUSE: GEOPATHS Program, to create and support innovative and inclusive projects to build the future geoscience workforce. This program is one component in NSF's Improving Undergraduate STEM Education (IUSE) initiative, which is a comprehensive, Foundation-wide effort to accelerate the quality and effectiveness of the education of undergraduates in all of the STEM fields. The two tracks of IUSE: GEOPATHS (EXTRA and IMPACT) seek to broaden and strengthen connections and activities that will engage and retain undergraduate students in geoscience education and career pathways, and help prepare them for a variety of careers. The long-term goal of this program is to dramatically increase the number and diversity of students earning undergraduate degrees or enrolling in graduate programs in geoscience fields, as well as

  6. Anarchist Epistemologies and the Separation of Science and State: The Critique and Relevance of Paul Feyerabend to Educational Foundations

    Science.gov (United States)

    Wolfmeyer, Mark

    2017-01-01

    This article synthesizes Paul Feyerabend's controversial contributions to 20th-century philosophy of science through the synthesis of his works and the secondary literature, with specific foci on current trends in educational foundations and the potentials and pitfalls for applying Feyerabendian logics to our work. First, I situate his strains of…

  7. 78 FR 20666 - Food and Drug Administration/National Institutes of Health/National Science Foundation Public...

    Science.gov (United States)

    2013-04-05

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration [Docket No. FDA-2013-N-0345] Food and Drug Administration/National Institutes of Health/ National Science Foundation Public Workshop... public workshop; request for comments. SUMMARY: The Food and Drug Administration (FDA) is announcing its...

  8. Historical Development and Key Issues of Data Management Plan Requirements for National Science Foundation Grants: A Review

    Science.gov (United States)

    Pasek, Judith E.

    2017-01-01

    Sharing scientific research data has become increasingly important for knowledge advancement in today's networked, digital world. This article describes the evolution of access to United States government information in relation to scientific research funded by federal grants. It analyzes the data sharing policy of the National Science Foundation,…

  9. Contested Domains of Science and Science Learning in Contemporary Native American Communities: Three Case Studies from a National Science Foundation grant titled, "Archaeology Pathways for Native Learners"

    Science.gov (United States)

    Parent, Nancy Brossard

    This dissertation provides a critical analysis of three informal science education partnerships that resulted from a 2003-2006 National Science Foundation grant titled, "Archaeology Pathways for Native Learners" (ESI-0307858), hosted by the Mashantucket Pequot Museum and Research Center. This dissertation is designed to contribute to understandings of learning processes that occur within and at the intersection of diverse worldviews and knowledge systems, by drawing upon experiences derived from three disparate contexts: 1) The Navajo Nation Museum in Window Rock, Arizona; 2) The A:shiwi A:wan Museum and Heritage Center on the Zuni Reservation in Zuni, New Mexico; and 3) Science learning camps at the Mashantucket Pequot Museum and Research Center for Native youth of southern New England. While informal science education is increasingly moving toward decolonizing and cross-cutting institutional boundaries of learning through critical thinking and real-world applications, the construction of "science" (even within diverse contexts) continues to be framed within a homogenous, predominantly Euro-American perspective. This study analyzes the language of Western science employed in these partnerships, with particular attention to the use of Western/Native binaries that shape perceptions of Native peoples and communities, real or imagined. Connections are drawn to broader nation-state interests in education, science, and the global economy. The role of educational evaluation in these case studies is also critically analyzed, by questioning the ways in which it is constructed, conducted, and evaluated for the purposes of informing future projects and subsequent funding. This study unpacks problems of the dominant language of "expert" knowledge embedded in Western science discourse, and highlights the possibilities of indigenous knowledge systems that can inform Western science frameworks of education and evaluation. Ultimately, this study suggests that research

  10. The National Science Foundation's Coupling, Energetics and Dynamics of Atmospheric Regions (CEDAR) Student Community

    Science.gov (United States)

    Sox, L.; Duly, T.; Emery, B.

    2014-12-01

    The National Science Foundation sponsors Coupling, Energetics, and Dynamics of Atmospheric Regions (CEDAR) Workshops, which have been held every summer, for the past 29 years. CEDAR Workshops are on the order of a week long and at various locations with the goal of being close to university campuses where CEDAR type scientific research is done. Although there is no formal student group within the CEDAR community, the workshops are very student-focused. Roughly half the Workshop participants are students. There are two Student Representatives on the CEDAR Science Steering Committee (CSSC), the group of scientists who organize the CEDAR Workshops. Each Student Representative is nominated by his or her peers, chosen by the CSSC and then serves a two year term. Each year, one of the Student Representatives is responsible for organizing and moderating a day-long session targeted for students, made up of tutorial talks, which aim to prepare both undergraduate and graduate students for the topics that will be discussed in the main CEDAR Workshop. The theme of this session changes every year. Past themes have included: upper atmospheric instrumentation, numerical modeling, atmospheric waves and tides, magnetosphere-ionosphere coupling, equatorial aeronomy and many others. Frequently, the Student Workshop has ended with a panel of post-docs, researchers and professors who discuss pressing questions from the students about the next steps they will take in their careers. As the present and past CSSC Student Representatives, we will recount a brief history of the CEDAR Workshops, our experiences serving on the CSSC and organizing the Student Workshop, a summary of the feedback we collected about the Student Workshops and what it's like to be student in the CEDAR community.

  11. [Analysis of projects of infectious disease epidemiology sponsored by National Natural Science Foundation of China].

    Science.gov (United States)

    Jian-Ming, Wang; Yan-Kai, Xia; Hui-Juan, Zhu; Feng, Chen; Hong-Bing, Shen

    2016-05-10

    To analyze the projects on the infectious disease epidemiology sponsored by the National Natural Science Foundation of China (NSFC), explore the hotspot and development trend, and offer a reference for researchers in this field. Based on the NSFC database, the projects on the infectious disease epidemiology (H2609) sponsored from 1987 to 2014 were analyzed. The changes of fund numbers, amounts and research fields were described. During the study period, NSFC sponsored 373 projects, including 228 general projects (61.1%), 78 youth projects (20.9%) and 67 other projects (18.0%). The average amount of the grant was 358.2 thousand Yuan (20 thousand-8 million). The main sponsored research fields were mechanisms of pathogen and immunity (36.2%) and population-based epidemiological studies (33.0%). The top three diseases were hepatitis, HIV/AIDS and tuberculosis. The amount of funding on researches of infectious disease epidemiology has increased continuously, which has played an important role in training scientific talents in the field of prevention and control of infectious diseases.

  12. Activities of the National Academy of Sciences in relation to the Radiation Effects Research Foundation

    International Nuclear Information System (INIS)

    Edington, C.W.

    1991-02-01

    The activities of the National Academy of Sciences (NAS), in relation to the Radiation Effects Research Foundation (RERF), has a long history and the specific time period supported by this contract is but a small piece of the long-term continuing program. As a background, in August 1945, atomic bombs were dropped on Hiroshima (6 August) and Nagasaki (9 August). Shortly after the bombings, US medical teams joined forces with their Japanese counterparts to form a Joint Commission for the Investigation of the Effects of the Atomic Bombs. As a result of the Joint Commission's investigations, it was determined that consideration should be given to the establishment of a long-term study of the potential late health effects of exposure of the survivors to radiation from the bombs. The results obtained from RERF studies contribute the vast majority of information that provides a better understanding of radiation effects on humans. This information has been used extensively by national organizations and international committees for estimating risks associated with radiation exposures. The estimated risks developed by these independent organizations are used by government agencies around the world to establish standards for protection of individuals exposed in the occupational, medical, and general environment. Some of these results are described briefly in this report

  13. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  14. A Quantum Private Query Protocol for Enhancing both User and Database Privacy

    Science.gov (United States)

    Zhou, Yi-Hua; Bai, Xue-Wei; Li, Lei-Lei; Shi, Wei-Min; Yang, Yu-Guang

    2018-01-01

    In order to protect the privacy of query user and database, some QKD-based quantum private query (QPQ) protocols were proposed. Unfortunately some of them cannot resist internal attack from database perfectly; some others can ensure better user privacy but require a reduction of database privacy. In this paper, a novel two-way QPQ protocol is proposed to ensure the privacy of both sides of communication. In our protocol, user makes initial quantum states and derives the key bit by comparing initial quantum state and outcome state returned from database by ctrl or shift mode instead of announcing two non-orthogonal qubits as others which may leak part secret information. In this way, not only the privacy of database be ensured but also user privacy is strengthened. Furthermore, our protocol can also realize the security of loss-tolerance, cheat-sensitive, and resisting JM attack etc. Supported by National Natural Science Foundation of China under Grant Nos. U1636106, 61572053, 61472048, 61602019, 61502016; Beijing Natural Science Foundation under Grant Nos. 4152038, 4162005; Basic Research Fund of Beijing University of Technology (No. X4007999201501); The Scientific Research Common Program of Beijing Municipal Commission of Education under Grant No. KM201510005016

  15. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  16. Lymphoma Research Foundation

    Science.gov (United States)

    ... Follow LRF Watch LRF Contact Us National Headquarters Wall Street Plaza 88 Pine Street, Suite 2400 | New York, NY 10005 212-349-2910 | 212-349-2886 Fax LRF@lymphoma.org LRF Helpline 800-500-9976 Helpline@lymphoma.org © 2012 Lymphoma Research Foundation | Privacy Policy

  17. Using Decision Tree Analysis to Understand Foundation Science Student Performance. Insight Gained at One South African University

    Science.gov (United States)

    Kirby, Nicola Frances; Dempster, Edith Roslyn

    2014-11-01

    The Foundation Programme of the Centre for Science Access at the University of KwaZulu-Natal, South Africa provides access to tertiary science studies to educationally disadvantaged students who do not meet formal faculty entrance requirements. The low number of students proceeding from the programme into mainstream is of concern, particularly given the national imperative to increase participation and levels of performance in tertiary-level science. An attempt was made to understand foundation student performance in a campus of this university, with the view to identifying challenges and opportunities for remediation in the curriculum and processes of selection into the programme. A classification and regression tree analysis was used to identify which variables best described student performance. The explanatory variables included biographical and school-history data, performance in selection tests, and socio-economic data pertaining to their year in the programme. The results illustrate the prognostic reliability of the model used to select students, raise concerns about the inefficiency of school performance indicators as a measure of students' academic potential in the Foundation Programme, and highlight the importance of accommodation arrangements and financial support for student success in their access year.

  18. Privacy policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, S.; Hartog, den J.I.; Petkovic, M.; Jonker, W.

    2007-01-01

    Privacy is a prime concern in today’s information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes

  19. Privacy Policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy; Petkovic, M.; Jonker, W.; Jonker, Willem

    2007-01-01

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  20. Professor Tony F. Chan Assistant Director for Mathematics and Physical Sciences National Science Foundation United States of America on 23rd May 2007. Here visiting ATLAS experiment with P. Jenni and M. Tuts.

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    Professor Tony F. Chan Assistant Director for Mathematics and Physical Sciences National Science Foundation United States of America on 23rd May 2007. Here visiting ATLAS experiment with P. Jenni and M. Tuts.

  1. National Science Foundation Assistant Director for Mathematics and Physical Sciences Tony Chan (USA) visiting LHCb experiment on 23rd May 2007 with Spokesperson T. Nakada, Advisor to CERN Director-General J. Ellis and I. Belyaev of Syracuse

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    National Science Foundation Assistant Director for Mathematics and Physical Sciences Tony Chan (USA) visiting LHCb experiment on 23rd May 2007 with Spokesperson T. Nakada, Advisor to CERN Director-General J. Ellis and I. Belyaev of Syracuse

  2. Normative Ethics Does Not Need a Foundation : It Needs More Science

    NARCIS (Netherlands)

    Quintelier, Katinka; van Speybroeck, Linda; Braeckman, Johan

    2011-01-01

    The impact of science on ethics forms since long the subject of intense debate. Although there is a growing consensus that science can describe morality and explain its evolutionary origins, there is less consensus about the ability of science to provide input to the normative domain of ethics.

  3. Social sciences research in neglected tropical diseases 3: Investment in social science research in neglected diseases of poverty: a case study of Bill and Melinda Gates Foundation.

    Science.gov (United States)

    Pokhrel, Subhash; Reidpath, Daniel; Allotey, Pascale

    2011-01-06

    The level of funding provides a good proxy for the level of commitment or prioritisation given to a particular issue. While the need for research relevant to social, economic, cultural and behavioural aspects of neglected tropical diseases (NTD) control has been acknowledged, there is limited data on the level of funding that supports NTD social science research. A case study was carried out in which the spending of a major independent funder, the Bill and Melinda Gates Foundation (BMGF) - was analysed. A total of 67 projects funded between October 1998 and November 2008 were identified from the BMGF database. With the help of keywords within the titles of 67 grantees, they were categorised as social science or non-social science research based on available definition of social science. A descriptive analysis was conducted. Of 67 projects analysed, 26 projects (39%) were social science related while 41 projects (61%) were basic science or other translational research including drug development. A total of US$ 697 million was spent to fund the projects, of which 35% ((US$ 241 million) went to social science research. Although the level of funding for social science research has generally been lower than that for non-social science research over 10 year period, social science research attracted more funding in 2004 and 2008. The evidence presented in this case study indicates that funding on NTD social science research compared to basic and translational research is not as low as it is perceived to be. However, as there is the acute need for improved delivery and utilisation of current NTD drugs/technologies, informed by research from social science approaches, funding priorities need to reflect the need to invest significantly more in NTD social science research.

  4. Social sciences research in neglected tropical diseases 3: Investment in social science research in neglected diseases of poverty: a case study of Bill and Melinda Gates Foundation

    Directory of Open Access Journals (Sweden)

    Reidpath Daniel

    2011-01-01

    Full Text Available Abstract Background The level of funding provides a good proxy for the level of commitment or prioritisation given to a particular issue. While the need for research relevant to social, economic, cultural and behavioural aspects of neglected tropical diseases (NTD control has been acknowledged, there is limited data on the level of funding that supports NTD social science research. Method A case study was carried out in which the spending of a major independent funder, the Bill and Melinda Gates Foundation (BMGF - was analysed. A total of 67 projects funded between October 1998 and November 2008 were identified from the BMGF database. With the help of keywords within the titles of 67 grantees, they were categorised as social science or non-social science research based on available definition of social science. A descriptive analysis was conducted. Results Of 67 projects analysed, 26 projects (39% were social science related while 41 projects (61% were basic science or other translational research including drug development. A total of US$ 697 million was spent to fund the projects, of which 35% ((US$ 241 million went to social science research. Although the level of funding for social science research has generally been lower than that for non-social science research over 10 year period, social science research attracted more funding in 2004 and 2008. Conclusion The evidence presented in this case study indicates that funding on NTD social science research compared to basic and translational research is not as low as it is perceived to be. However, as there is the acute need for improved delivery and utilisation of current NTD drugs/technologies, informed by research from social science approaches, funding priorities need to reflect the need to invest significantly more in NTD social science research.

  5. Reading for meaning: The foundational knowledge every teacher of science should have

    Science.gov (United States)

    Patterson, Alexis; Roman, Diego; Friend, Michelle; Osborne, Jonathan; Donovan, Brian

    2018-02-01

    Reading is fundamental to science and not an adjunct to its practice. In other words, understanding the meaning of the various forms of written discourse employed in the creation, discussion, and communication of scientific knowledge is inherent to how science works. The language used in science, however, sets up a barrier, that in order to be overcome requires all students to have a clear understanding of the features of the multimodal informational texts employed in science and the strategies they can use to decode the scientific concepts communicated in informational texts. We argue that all teachers of science must develop a functional understanding of reading comprehension as part of their professional knowledge and skill. After describing our rationale for including knowledge about reading as a professional knowledge base every teacher of science should have, we outline the knowledge about language teachers must develop, the knowledge about the challenges that reading comprehension of science texts poses for students, and the knowledge about instructional strategies science teachers should know to support their students' reading comprehension of science texts. Implications regarding the essential role that knowledge about reading should play in the preparation of science teachers are also discussed here.

  6. [The analysis on the funding of Natural Science Foundation of China for acupuncture projects from 2005 to 2015].

    Science.gov (United States)

    Deng, Hongyong; Xu, Ji

    2017-05-12

    The funding of Natural Science Foundation of China (NSFC) for acupuncture projects from 2005 to 2015 was summarized and analyzed. The results indicated during past 11 years, 711 projects regarding acupuncture were funded by NSFC, with a total of 281 million RMB, accounting for 12.39% in TCM projects. It was concluded the funding for acupuncture projects was increased year by year, but was still relatively weak; in addition, the funding was unbalanced in different areas and organizations, mainly in Beijing, Shanghai, Sichuan, Guangdong, Tianjin, and the continuity and variability both existed in research content and direction.

  7. [Characteristics and innovation in projects of ethnomedicine and ethnopharmacology funded by National Natural Science Foundation of China].

    Science.gov (United States)

    Han, Li-wei

    2015-09-01

    The overall situation of projects of ethnomedicine and ethnopharmacology funded by the National Natural Science Foundation of China (NSFC) since 2008 has been presented in this paper. The main source of characteristics and innovation of the funded projects were summarized, which may come from several aspects, such as the ethnomedical theories, the dominant diseases of ethnomedicine, special diseases in ethnic minorities inhabited areas, unique ethnomedical therapy, special methods for applying medication, endemic medicinal materials in ethnic minorities inhabited areas, same medicinal materials with different applications. Examples have been provided to give references to the applicants in the fields of ethnomedicine and ethnopharmacology.

  8. Principles and foundation: national standards on quantities and units in nuclear science field

    International Nuclear Information System (INIS)

    Chen Lishu

    1993-11-01

    The main contents of National Standards on Quantities and units of atomic and nuclear physics (GB 3102.9) and Quantities and Units of nuclear reactions and ionizing radiations (GB 310.10) are presented in which most important quantities with their symbols and definitions in the nuclear scientific field are given. The principles and foundation, including the International System of Units (SI) and its application to the nuclear scientific field, in the setting of the National Standards are explained

  9. Privacy and Data-Based Research

    OpenAIRE

    Ori Heffetz; Katrina Ligett

    2013-01-01

    What can we, as users of microdata, formally guarantee to the individuals (or firms) in our dataset, regarding their privacy? We retell a few stories, well-known in data-privacy circles, of failed anonymization attempts in publicly released datasets. We then provide a mostly informal introduction to several ideas from the literature on differential privacy, an active literature in computer science that studies formal approaches to preserving the privacy of individuals in statistical databases...

  10. Genetic privacy.

    Science.gov (United States)

    Sankar, Pamela

    2003-01-01

    During the past 10 years, the number of genetic tests performed more than tripled, and public concern about genetic privacy emerged. The majority of states and the U.S. government have passed regulations protecting genetic information. However, research has shown that concerns about genetic privacy are disproportionate to known instances of information misuse. Beliefs in genetic determinacy explain some of the heightened concern about genetic privacy. Discussion of the debate over genetic testing within families illustrates the most recent response to genetic privacy concerns.

  11. 75 FR 9000 - Comment Request: National Science Foundation Proposal/Award Information-Grant Proposal Guide

    Science.gov (United States)

    2010-02-26

    ... of women and minorities in science and engineering. Another major change occurred in 1986, when... directed NSF to initiate and support: Basic scientific research and research fundamental to the engineering process; Programs to strengthen scientific and engineering research potential; Science and engineering...

  12. 78 FR 9071 - Comment Request: National Science Foundation Proposal/Award Information-Grant Proposal Guide

    Science.gov (United States)

    2013-02-07

    ... activities to improve the participation of women and minorities in science and engineering. Another major... and research fundamental to the engineering process; Programs to strengthen scientific and engineering research potential; Science and engineering education programs at all levels and in all the various fields...

  13. 76 FR 4947 - Comment Request: National Science Foundation Proposal & Award Policies and Procedures Guide

    Science.gov (United States)

    2011-01-27

    ... of women and minorities in science and engineering. Another major change occurred in 1986, when... directed NSF to initiate and support: Basic scientific research and research fundamental to the engineering process; Programs to strengthen scientific and engineering research potential; Science and engineering...

  14. Developing a Foundation for Constructing New Curricula in Soil, Crop, and Turfgrass Sciences

    Science.gov (United States)

    Jarvis, Holly D.; Collett, Ryan; Wingenbach, Gary; Heilman, James L.; Fowler, Debra

    2012-01-01

    Some soil and crop science university programs undergo curricula revision to maintain relevancy with their profession and/or to attract the best students to such programs. The Department of Soil and Crop Sciences at Texas A&M University completed a thorough data gathering process as part of its revision of the undergraduate curriculum and…

  15. Biological Evolution and the History of the Earth Are Foundations of Science

    Science.gov (United States)

    2008-01-01

    AGU affirms the central importance of including scientific theories of Earth history and biological evolution in science education. Within the scientific community, the theory of biological evolution is not controversial, nor have ``alternative explanations'' been found. This is why no competing theories are required by the U.S. National Science Education Standards. Explanations of natural phenomena that appeal to the supernatural or are based on religious doctrine-and therefore cannot be tested through scientific inquiry-are not scientific, and have no place in the science classroom.

  16. Foundations of the Formal Sciences VI: Probabilistic reasoning and reasoning with probabilities

    NARCIS (Netherlands)

    Löwe, B.; Pacuit, E.; Romeijn, J.W.

    2009-01-01

    Probabilistic methods are increasingly becoming an important tool in a variety of disciplines including computer science, mathematics, artificial intelligence, epistemology, game and decision theory and linguistics. In addition to the discussion on applications of probabilistic methods there is an

  17. The autonomous system a foundational synthesis of the sciences of the mind

    CERN Document Server

    de Gyurky, Szabolcs Michael

    2013-01-01

    This book describes-in modern computer science terms-the Level II architecture of the meaning and definition of the process referred to as ""thinking."" It applies the basis of early cognitive science research to the creation of autonomous system architectures-connecting philosophical findings of the past with cutting-edge progress in artificial intelligence. Providing an in-depth introduction to the classical, philosophical theories of cognitive scientists like Immanuel Kant, Arthur Schopenhauer, and G.W.F. Hegel, the book examines the Will System, Reason System, Imagination System, and the C

  18. Freud, Weber, Durkheim: A Philosophical Foundation for Writing in the Humanities and Social Sciences.

    Science.gov (United States)

    LeFevre, Karen B.; Larkin, T. J.

    1983-01-01

    Proposes a continuum of lines of inquiry applicable to many of the human sciences. Illustrates the continuum by discussing the approaches of Sigmund Freud, Max Weber, and Emile Durkheim. Suggests uses of the continuum as an aid to invention and as a method of analysis. (RAE)

  19. Spatial Foundations of Science Education: The Illustrative Case of Instruction on Introductory Geological Concepts

    Science.gov (United States)

    Liben, Lynn S.; Kastens, Kim A.; Christensen, Adam E.

    2011-01-01

    To study the role of spatial concepts in science learning, 125 college students with high, medium, or low scores on a horizontality (water-level) spatial task were given information about geological strike and dip using existing educational materials. Participants mapped an outcrop's strike and dip, a rod's orientation, pointed to a distant…

  20. 75 FR 65528 - Membership of National Science Foundation's Senior Executive Service Performance Review Board

    Science.gov (United States)

    2010-10-25

    ... Director, Division of Human Resource Management and Chief Human Capital Officer, National Science..., Division of Human Resource Management and Chief Human Capital Officer; Mark L. Weiss, Director, Division of... Human Resource Management and Chief Human Capital Officer. [FR Doc. 2010-26763 Filed 10-22-10; 8:45 am...

  1. The Jan Korec Foundation

    International Nuclear Information System (INIS)

    2007-01-01

    In this video-film activities of the the Jan Korec Foundation are presented. The Jan Korec Foundation supports students of technical sciences, sport activities, science and support of book publishing, humanitarian supports, the environment protection as well as support of different social projects.

  2. Science standards: The foundation of evolution education in the United States

    Directory of Open Access Journals (Sweden)

    Elizabeth Watts

    2016-12-01

    Full Text Available Science standards and textbooks have a huge impact on the manner in which evolution is taught in American classrooms. Standards dictate how much time and what points have to be dedicated to the subject in order to prepare students for state-wide assessments, while the textbooks will largely determine how the subject is presented in the classroom. In the United States both standards and textbooks are determined at the state-level through a political process. Currently there is a tremendous amount of pressure arising from anti-evolutionists in the United States to weaken or omit the teaching of evolution despite recommendations from central institutions such as the National Academy of Science. Results from the Program for International Student Assessment (PISA showed that not only are American students performing below average, but also that their performance is declining as they scored worse in 2012 than they did in 2010. Interestingly PISA also found that the internal variation within a country is often greater than between countries with a variation of up to 300 points, which is equivalent to seven years of education pointing to the extreme heterogeneous quality of education within a country (OECD, 2012. An implementation of strong standards would not only help to increase the average performance of American students but could also alleviate the vast discrepancy between the highest and lowest scoring groups of American students. Although the Next Generation Science Standards have been in existence since 2013 and A Framework for K-12 Science Education has been available to the public since 2011 many American states still continue to create their own standards that, according to the Fordham study, are well below par (Lerner et al., 2012. Due to the political nature of the adoption procedure of standards and textbooks, there are many opportunities for interested individuals to get involved in the process of improving these fundamental elements of

  3. Information Quality as a Foundation for User Trustworthiness of Earth Science Data.

    Science.gov (United States)

    Wei, Y.; Moroni, D. F.; Ramapriyan, H.; Peng, G.

    2017-12-01

    Information quality is multidimensional. Four different aspects of information quality can be defined based on the lifecycle stages of Earth Science data products: science, product, stewardship and services. With increasing requirements on ensuring and improving information quality coming from multiple government agencies and throughout industry, there have been considerable efforts toward improving information quality during the last decade, much of which has not been well vetted in a collective sense until recently. Given this rich background of prior work, the Information Quality Cluster (IQC), established within the Federation of Earth Science Information Partners (ESIP) in 2011, and reactivated in the summer of 2014, has been active with membership from multiple organizations. The IQC's objectives and activities, aimed at ensuring and improving information quality for Earth science data and products, are also considered vital toward improving the trustworthiness of Earth science data to a vast and interdisciplinary community of data users. During 2016, several members of the IQC have led the development and assessment of four use cases. This was followed up in 2017 with multiple panel sessions at the 2017 Winter and Summer ESIP Meetings to survey the challenges posed in the various aspects of information quality. What was discovered to be most lacking is the transparency of data lineage (i.e., provenance and maturity), uniform methods for uncertainty characterization, and uniform quality assurance data and metadata. While solutions to these types of issues exist, most data producers have little time to investigate and collaborate to arrive at and conform to a consensus approach. The IQC has positioned itself as a community platform to bring together all relevant stakeholders from data producers, repositories, program managers, and the end users. A combination of both well-vetted and "trailblazing" solutions are presented to address how data trustworthiness can

  4. Clinical genomics, big data, and electronic medical records: reconciling patient rights with research when privacy and science collide.

    Science.gov (United States)

    Kulynych, Jennifer; Greely, Henry T

    2017-04-01

    Widespread use of medical records for research, without consent, attracts little scrutiny compared to biospecimen research, where concerns about genomic privacy prompted recent federal proposals to mandate consent. This paper explores an important consequence of the proliferation of electronic health records (EHRs) in this permissive atmosphere: with the advent of clinical gene sequencing, EHR-based secondary research poses genetic privacy risks akin to those of biospecimen research, yet regulators still permit researchers to call gene sequence data 'de-identified', removing such data from the protection of the federal Privacy Rule and federal human subjects regulations. Medical centers and other providers seeking to offer genomic 'personalized medicine' now confront the problem of governing the secondary use of clinical genomic data as privacy risks escalate. We argue that regulators should no longer permit HIPAA-covered entities to treat dense genomic data as de-identified health information. Even with this step, the Privacy Rule would still permit disclosure of clinical genomic data for research, without consent, under a data use agreement, so we also urge that providers give patients specific notice before disclosing clinical genomic data for research, permitting (where possible) some degree of choice and control. To aid providers who offer clinical gene sequencing, we suggest both general approaches and specific actions to reconcile patients' rights and interests with genomic research.

  5. Clinical genomics, big data, and electronic medical records: reconciling patient rights with research when privacy and science collide

    Science.gov (United States)

    Greely, Henry T.

    2017-01-01

    Abstract Widespread use of medical records for research, without consent, attracts little scrutiny compared to biospecimen research, where concerns about genomic privacy prompted recent federal proposals to mandate consent. This paper explores an important consequence of the proliferation of electronic health records (EHRs) in this permissive atmosphere: with the advent of clinical gene sequencing, EHR-based secondary research poses genetic privacy risks akin to those of biospecimen research, yet regulators still permit researchers to call gene sequence data ‘de-identified’, removing such data from the protection of the federal Privacy Rule and federal human subjects regulations. Medical centers and other providers seeking to offer genomic ‘personalized medicine’ now confront the problem of governing the secondary use of clinical genomic data as privacy risks escalate. We argue that regulators should no longer permit HIPAA-covered entities to treat dense genomic data as de-identified health information. Even with this step, the Privacy Rule would still permit disclosure of clinical genomic data for research, without consent, under a data use agreement, so we also urge that providers give patients specific notice before disclosing clinical genomic data for research, permitting (where possible) some degree of choice and control. To aid providers who offer clinical gene sequencing, we suggest both general approaches and specific actions to reconcile patients’ rights and interests with genomic research. PMID:28852559

  6. Foundations for Science of Information: Reflection on the Method of Inquiry

    Directory of Open Access Journals (Sweden)

    Marcin J. Schroeder

    2011-10-01

    Full Text Available The paper considers necessary conditions for establishing information science as a scientific autonomous disci- pline. The lack of a commonly accepted definition of information is not as threatening as it may seem, as each study within the discipline may choose an own definition, as well as an own philosophical framework, when there are some alternatives to choose between. More important is the development of a common methodology of inquiry and some range of standard questions regarding the concept of information. Also, it is important to develop some standards of inquiry, which would make information scientific studies accessible to philosophical analysis and reflection. In turn, contributions of information science to the resolution of problems identified within philosophy will give the best measure of maturity for information sci- ence as a discipline.

  7. The map and the territory exploring the foundations of science, thought and reality

    CERN Document Server

    Doria, Francisco

    2018-01-01

    The Map/Territory distinction is a foundational part of the scientific method and, in fact, underlies all of thought, and even reality itself. This fascinating and fundamental topic is addressed here by some of the world’s leading thinkers and intellectual giants, whose accessible essays cover six and more fields of endeavor. It is imperative to distinguish the Map from the Territory when analyzing any subject, yet we often mistake the map for the territory; the meaning for the reference; a computational tool for what it computes. Representations are so handy and tempting that we often end up committing the category error of over-associating the representation with the thing it represents, so much so that the distinction between them is lost. This error, whose roots frequently lie in pedagogy, generates a plethora of paradoxes/confusions which hinder a proper understanding of the subject. What are wave functions? Fields? Forces? Numbers? Sets? Classes? Operators? Functions? Alphabets and Sentences? Are they...

  8. Against all odds: Tales of survival and growth of the Foundational Approaches in Science Teaching (FAST) project

    Science.gov (United States)

    Yamamoto, Karen Kina

    This study examines the dynamics of survival and growth of curricular and instructional innovations. It focuses on the Foundational Approaches in Science Teaching (FAST) project, a long-term survivor of reform in science education. Key questions guiding this study include: (1) How did the FAST project survive over the past 30 years? (2) What elements are essential for long-term survival and growth of an innovative science program? (3) Why did the project continue to survive amidst several waves of educational reform? The core of my conceptual framework is that the odds of survival and growth of curricular and instructional innovations are increased by the extent to which resources, theory-based curriculum development processes, and professional development strategies are not only incorporated into but also interdependent within a project. With this framework as a guide, the main methods of data collection were document analysis, interviews, and observations. FAST, developed by the University of Hawaii's Curriculum Research and Development Group (CRDG), consists of a sequential and interdisciplinary middle and high school science program for students in grades 6-10. According to the results of this study, the project was able to survive by receiving constant organizational support from CRDG and a steady source of State funding through the university since 1966; it also retained a relatively small but stable staff of highly qualified project personnel. Formulated on a discipline-based theory that values development of students' intellectual capacities as the platform for curriculum research, design, and development, the FAST project translated this vision of science education into key elements of an innovative program that survived and thrived: (1) an interdisciplinary program consisting of physical, biological, and earth sciences; inquiry as content and process; history and philosophy of science; and links between and among sciences, technology, and society; and (2

  9. [Applications and approved projects on traditional Chinese medicine in National Natural Science Foundation of China in 2010].

    Science.gov (United States)

    Shang, Hong-cai; Huang, Jin-ling; Han, Li-wei; Pei, Ling-peng; Guo, Lin; Lin, Na; Wang, Chang-en

    2011-10-01

    In this article, the authors firstly summarized the number of applications submitted to and projects supported by the National Natural Science Foundation of China (NSFC) in the field of traditional Chinese medicine research in 2010. Then they described the district distribution, research direction layout and allotment of the approved projects in the three primary disciplines (traditional Chinese medicine, Chinese materia medica and integrated traditional Chinese and Western medicine) and their 43 subdisciplines. The targeting suggestions for improvement were given respectively by concluding the reason of disapproved projects from the point of view of applicants and supporting institution, and by stating the common problems existing in the review process from the perspectives of fund managers and evaluation experts. Lastly, the major funding fields in the near future were predicted in the hope of providing guidance for applicants.

  10. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  11. Kahua A';o--A Learning Foundation: Using Hawaiian Language Newspaper Articles for Science and Science Education

    Science.gov (United States)

    Chinn, P. W.; Businger, S.

    2013-12-01

    Kahua A';o, an NSF OEDG project, utilizes Hawaiian language newspaper articles written between 1843 and 1948 in lessons and professional development intended to increase participation of underrepresented Native Hawaiian students in earth science. Guided by sociocultural theories that view learning as experiential and culturally situated, geoscientists (Steven Businger, Scott Rowland, Floyd McCoy, UG student Kelly Lance); Hawaiian translators (M. Puakea Nogelmeier, GRAs Kapomaikai Stone and Iasona Ellinwood); science educators (Pauline Chinn, graduate student Lindsey Spencer), utilize articles to develop place-based meteorology and geology curricula for middle school teachers. Articles are valuable to science and science education: Native Hawaiians are citizen scientists who recorded, interpreted, and communicated findings to potentially critical audiences, while dated, descriptive, eye witness reports provide data on events unrecorded by westerners. Articles reveal Hawaiian intellectual tradition placed great value on environmental knowledge. Moolelo (traditional stories) e.g., Kuapākaa (Nakuina, 1905), translated as The Wind Gourd of Laamaomao, tells of Kuapākaa controlling all the winds of Hawai';i by chanting their names--a metaphor for the power of knowledge of winds, rains and their patterns. In the moolelo of Kalapana, a boy hero challenges and defeats the king of Kauai to a life-and-death riddling contest (Nakuina, 1902). Maly's (2001) translation of a riddle involving 22 zones spanning mountaintop to deep-sea underscores the knowledge base informing sustainable practices. Articles provide insight into indigenous maps (Nogelmeier, personal communication) while riddling contests (Beckwith, 1940/1970) establish demonstrations of knowledge as central to power, identity, and status. Eight field-based lessons have been presented to formal and informal science educators, with teachers adapting lessons for 3rd-12th grade students. Graduate students Spencer, Stone

  12. Common foundations of optimal control across the sciences: evidence of a free lunch

    Science.gov (United States)

    Russell, Benjamin; Rabitz, Herschel

    2017-03-01

    A common goal in the sciences is optimization of an objective function by selecting control variables such that a desired outcome is achieved. This scenario can be expressed in terms of a control landscape of an objective considered as a function of the control variables. At the most basic level, it is known that the vast majority of quantum control landscapes possess no traps, whose presence would hinder reaching the objective. This paper reviews and extends the quantum control landscape assessment, presenting evidence that the same highly favourable landscape features exist in many other domains of science. The implications of this broader evidence are discussed. Specifically, control landscape examples from quantum mechanics, chemistry and evolutionary biology are presented. Despite the obvious differences, commonalities between these areas are highlighted within a unified mathematical framework. This mathematical framework is driven by the wide-ranging experimental evidence on the ease of finding optimal controls (in terms of the required algorithmic search effort beyond the laboratory set-up overhead). The full scope and implications of this observed common control behaviour pose an open question for assessment in further work. This article is part of the themed issue 'Horizons of cybernetical physics'.

  13. [Analysis on Research Projects Supported by the National Natural Science Foundation of China at the National Institute of Parasitic Diseases during 2003-2013].

    Science.gov (United States)

    Zhou, Xiao-jun; Zheng, Bin; Yi, Feng-yun; Xiong, Yan-hong; Zhang, Min-qi

    2015-04-01

    The data of the National Natural Science Foundation (NSFC) projests obtained by the National Institute of Parasitic Diseases (NIPD), Chinese Center for Disease Control and Prevention (China CDC) during 2003-2013 were collected from internet-based science information system of NSFC, and NSFC search tool of Dingxiang Garden (http://nsfc.biomart.cn/). The number of funded projects, their subject classification and approved amount were analyzed, and compared with the other institutes of China CDC. Furthermore, the rationalization proposals were given in order to enhance the level of foundation management in the future.

  14. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  15. Kahua A'o—A Learning Foundation: Using Hawaiian Language Newspaper Articles for Earth Science Professional Development

    Science.gov (United States)

    Chinn, P. W.

    2012-12-01

    Kahua A'o, an NSF OEDG project, utilizes Hawaiian language newspaper articles written between 1843 and 1948 as a foundation for culturally responsive geoscience curriculum and professional development. In Hawaii, a lack of qualified teachers limits students' awareness of Earth Science in their lives, as careers and a way to understand past, present, and future. This particularly impacts Native Hawaiians, 28% of students in Hawaii''s public schools but underrepresented in STEM majors and careers. Guided by sociocultural theories that view learning as experiential and culturally situated, geoscientists, Hawaiian translators, and science educators utilize articles to develop meteorology and geology modules for middle school teachers. Articles provide insights about living sustainably on islands exposed to volcanic eruptions, earthquakes, tsunami, drought, and storms. Hawaii's remoteness and diverse topography supported the development of mountain-to-sea, sustainable, social ecosystems called ahupuaa. Hawaiians recognized each ahupuaa's unique winds, rains, fauna, flora, cultivars, and geologic features. The story of Pele chanting the winds of Kauai to prove she was not a stranger grounds identity and status in environmental knowledge. The story is culturally congruent with science explanations of how the Hawaiian Islands' diverse shapes and topography interact with heating, cooling, and large scale wind systems to create hundreds of local winds and rains. This presentation reports on "Local Winds and Rains of Hawaii, I Kamaāina i Na Makani a Me Nā Ua and "Weather Maps and Hazardous Storms in Hawaii, Nā 'Ino Ma Hawaii Nei." Highly detailed observations of an 1871 severe wind event enable students to estimate winds speeds using the Beaufort Scale, determine the storm's path and decide if it was the first recorded hurricane on the island of Hawaii. A visit to NOAA's National Weather Service triggered discussions about Hawaiian language weather reports. A Hawaiian

  16. Cornelia de Lange Syndrome Foundation

    Science.gov (United States)

    ... Outside Links Privacy & Terms Site Map The Cornelia de Lange Syndrome (CdLS) Foundation is a family support organization that ... research into the causes and manifestations of the syndrome, and help people with a diagnosis of CdLS make informed decisions throughout their lives.

  17. National Science Foundation Grant Implementation: Perceptions of Teachers and Graduate Fellows in One School Regarding the Barriers and Successes

    Science.gov (United States)

    Pickering, Sharon Durham

    The purpose of this qualitative case study was to examine the perceptions of partner teachers and graduate fellows in 1 school regarding the barriers and successes made during their participation in a National Science Foundation Grant. This study included 9 partner teachers and 7 graduate fellows who participated in the Science First! NSF GK-12 Grant. There were 16 participants in this study. This study was conducted at North Side Elementary and East Tennessee State University. Partner teachers and graduate fellows were interviewed to gain perceptions of the barriers and successes of their participation in the implementation of the Science First! grant at North Side and East Tennessee State University from 2008-2013. A list of possible participants in the study was provided from the grant leadership team. The 16 participants in the study were chosen through purposeful sampling. During data analysis, 4 themes arose as successes and 4 themes arose as barriers. The success themes were (a) relationships, (b) mutual appreciation, (c) increased academic depth, and (d) professional growth. The barriers were (a) communication, (b) time, (c) expectations, and (d) preparation. Based on the research, the following conclusions were presented. The coordination of a major NSF-GK12 grant can provide STEM support and academic rigor for a high poverty school with leadership. Positive relationships between the graduate fellows and partner teachers as well as the 2 participating institutions are critical in fostering successful grant implementation. Professional growth through the grant partnerships was obtained. The participants gained a mutual appreciation for the roles and responsibilities of each other. There are ups and downs in implementing a large grant at 1 elementary school with a university, but the rewards of the potential to influence teacher practices in STEM and student learning are great. Recommendations from the study findings may assist future grant award winners or

  18. From the NSF: The National Science Foundation's Investments in Broadening Participation in Science, Technology, Engineering, and Mathematics Education through Research and Capacity Building.

    Science.gov (United States)

    James, Sylvia M; Singer, Susan R

    The National Science Foundation (NSF) has a long history of investment in broadening participation (BP) in science, technology, engineering, and mathematics (STEM) education. A review of past NSF BP efforts provides insights into how the portfolio of programs and activities has evolved and the broad array of innovative strategies that has been used to increase the participation of groups underrepresented in STEM, including women, minorities, and persons with disabilities. While many are familiar with these long-standing programmatic efforts, BP is also a key component of NSF's strategic plans, has been highlighted in National Science Board reports, and is the focus of ongoing outreach efforts. The majority of familiar BP programs, such as the Louis Stokes Alliances for Minority Participation (now 25 years old), are housed in the Directorate for Education and Human Resources. However, fellowship programs such as the Graduate Research Fellowships and Postdoctoral Research Fellowships under the Directorate for Biological Sciences (and parallel directorates in other STEM disciplines) are frequently used to address underrepresentation in STEM disciplines. The FY2016 and FY2017 budget requests incorporate funding for NSF INCLUDES, a new cross-agency BP initiative that will build on prior successes while addressing national BP challenges. NSF INCLUDES invites the use of innovative approaches for taking evidence-based best practices to scale, ushering in a new era in NSF BP advancement. © 2016 S. M. James and S. R. Singer. CBE—Life Sciences Education © 2016 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  19. The Preparation of Students from National Science Foundation-Funded and Commercially Developed High School Mathematics Curricula for their First University Mathematics Course

    Science.gov (United States)

    Harwell, Michael; Post, Thomas R.; Cutler, Arnie; Maeda, Yukiko; Anderson, Edwin; Norman, Ke Wu; Medhanie, Amanuel

    2009-01-01

    The selection of K-12 mathematics curricula has become a polarizing issue for schools, teachers, parents, and other educators and has raised important questions about the long-term influence of these curricula. This study examined the impact of participation in either a National Science Foundation-funded or commercially developed mathematics…

  20. 76 FR 26721 - Re-Issuance of a General Permit to the National Science Foundation for the Ocean Disposal of Man...

    Science.gov (United States)

    2011-05-09

    ...EPA proposes to re-issue a permit authorizing the National Science Foundation (NSF) to dispose of ice piers in ocean waters. Permit re-issuance is necessary because the current permit has expired. EPA does not propose changes to the content of the permit because ocean disposal under the terms of the previous permit will continue to meet the ocean disposal criteria.

  1. Extending the Pathway: Building on a National Science Foundation Workforce Development Project for Underserved k-12 Students

    Science.gov (United States)

    Slattery, W.; Smith, T.

    2014-12-01

    With new career openings in the geosciences expected and a large number of presently employed geoscientists retiring in the next decade there is a critical need for a new cadre of geoscientists to fill these positions. A project funded by the National Science Foundation titled K-12 Students, Teachers, Parents, Administrators and Higher Education Faculty: Partners Helping Rural Disadvantaged Students Stay on the Pathway to a Geoscience Career involving Wright State University and the Ripley, Lewis, Union, Huntington k-12 school district in Appalachian Ohio took led to dozens of seventh and eighth grade students traveling to Sandy Hook, New Jersey for a one week field experience to study oceanography with staff of the New Jersey Sea Grant Consortium. Teachers, parent chaperones, administrators and university faculty accompanied the students in the field. Teachers worked alongside their students in targeted professional development during the weeklong field experience. During the two academic years of the project, both middle school and high school teachers received professional development in Earth system science so that all students, not just those that were on the summer field experience could receive enhanced science learning. All ninth grade high school students were given the opportunity to take a high school/college dual credit Earth system science course. Community outreach provided widespread knowledge of the project and interest among parents to have their children participate. In addition, ninth grade students raised money themselves to fund a trip to the International Field Studies Forfar Field Station on Andros Island, Bahamas to study a tropical aquatic system. Students who before this project had never traveled outside of Ohio are currently discussing ways that they can continue on the pathway to a geoscience career by applying for internships for the summer between their junior and senior years. These are positive steps towards taking charge of their

  2. Toward sensitive document release with privacy guarantees

    OpenAIRE

    David Sánchez; Montserrat Batet

    2017-01-01

    Toward sensitive document release with privacy guarantees DOI: 10.1016/j.engappai.2016.12.013 URL: http://www.sciencedirect.com/science/article/pii/S0952197616302408 Filiació URV: SI Inclòs a la memòria: SI Privacy has become a serious concern for modern Information Societies. The sensitive nature of much of the data that are daily exchanged or released to untrusted parties requires that responsible organizations undertake appropriate privacy protection measures. Nowadays, much...

  3. Oley Foundation

    Science.gov (United States)

    ... nutrition and tube feeding through education, advocacy, and networking. About About Oley Advisory Council Bylaws and Financials Board of Trustees FAQs Help - Sign In Policies Photo Policy Privacy Policy Conflict of Interest Staff ...

  4. Student Science Training Program in Mathematics, Physics and Computer Science. Final Report to the National Science Foundation. Artificial Intelligence Memo No. 393.

    Science.gov (United States)

    Abelson, Harold; diSessa, Andy

    During the summer of 1976, the MIT Artificial Intelligence Laboratory sponsored a Student Science Training Program in Mathematics, Physics, and Computer Science for high ability secondary school students. This report describes, in some detail, the style of the program, the curriculum and the projects the students under-took. It is hoped that this…

  5. Privacy and Ethics in Undergraduate GIS Curricula

    Science.gov (United States)

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  6. Student Contributions to Citizen Science Programs As a Foundation for Independent and Classroom-Based Undergraduate Research in the Earth Sciences

    Science.gov (United States)

    Guertin, L. A.

    2014-12-01

    Environmental monitoring projects on the grounds of a campus can serve as data collection sites for undergraduate research. Penn State Brandywine has utilized students in independent study projects to establish two citizen science programs and to begin collecting data, with the data sets serving as a foundation for authentic inquiry-based exercises in introductory-level Earth science courses. The first citizen science program is The Smithsonian Institution's Global Tree Banding Project, which contributes to research about tree biomass by tracking how trees respond to climate. We are going beyond the requirements of the Smithsonian project. Instead of only taking two measurements each in the spring and fall, undergraduate researchers are taking measurements every two weeks throughout the year. We started taking measurements of ten trees on campus in 2012 will continue until each tree outgrows its tree band. The data is available for download in Google Spreadsheets for students to examine changes in tree diameter within one or between growing seasons, supplemented with temperature and precipitation data (see http://sites.psu.edu/treebanding/). A second citizen science program we have begun on campus is the NASA-funded Digital Earth Watch (DEW) Picture Post Project, allowing students to monitor the environment and share observations through digital photography. We established four Picture Post sites on campus, with students taking weekly photos to establish an environmental baseline of the campus landscape and to document future environmental changes pre- and post-construction. We started taking digital photos on campus in 2014 will continue well past the completion of construction to continue to look for changes. The image database is less than a year old, but the images provide enough information for some early analyses, such as the variations in "greenness" over the seasons. We have created a website that shares the purpose of our participation in the Picture Post

  7. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  8. [Research progresses of the completed pediatrics projects funded by National Natural Science Foundation of China from 2002 to 2006].

    Science.gov (United States)

    Xu, Ling; Hao, Jie; Deng, Min; Xu, Yan-ying

    2009-05-01

    To understand the projects completion and research progresses in pediatrics which were funded by the National Natural Science Foundation of China (NSFC), and evaluate the accomplishment objectively and justly. The completion status of projects in pediatrics funded by department of clinical medicine II from 2002 to 2006 was analysed retrospectively, and important research achievement and outstanding development in some projects were reported. During the period between 2002 and 2006, 420 articles were published, and the average was 8.1 papers per project, which included 56 papers that were published in journals indexed by SCI (the average was 1.1 papers per project). The completion of general project was better than that of "the Young Researchers Fund" and small grant project. Ten post-doctors, 102 doctors and 109 masters were trained. Two projects were awarded with the first grade prize and another 2 with the second grade prize at the provincial and ministerial level, 4 items applied for patent and 1 was granted. These completed projects, which were mainly related to 7 of 12 subspecialties in the field of pediatrics, such as the respiratory disease, nephrology, neurology, cardiology, endocrinology, hematology, neonatology, are the major portion of the application projects and subsidized projects funded by NSFC, and achieved great research progresses. During the period between 2002 and 2006, the 52 completed projects in pediatrics showed difference in the distribution and quality of accomplishment among subspecialties and among types of supported projects; there are some gaps between pediatrics and some other clinical basic subspecialties II, this situation released the research status and problems in development of pediatrics in China. The general projects completion was good, and many projects obtained research achievements, which reflect the leading function of NSFC in pediatric research.

  9. Risk assessment of student performance in the International Foundations of Medicine Clinical Science Examination by the use of statistical modeling.

    Science.gov (United States)

    David, Michael C; Eley, Diann S; Schafer, Jennifer; Davies, Leo

    2016-01-01

    The primary aim of this study was to assess the predictive validity of cumulative grade point average (GPA) for performance in the International Foundations of Medicine (IFOM) Clinical Science Examination (CSE). A secondary aim was to develop a strategy for identifying students at risk of performing poorly in the IFOM CSE as determined by the National Board of Medical Examiners' International Standard of Competence. Final year medical students from an Australian university medical school took the IFOM CSE as a formative assessment. Measures included overall IFOM CSE score as the dependent variable, cumulative GPA as the predictor, and the factors age, gender, year of enrollment, international or domestic status of student, and language spoken at home as covariates. Multivariable linear regression was used to measure predictor and covariate effects. Optimal thresholds of risk assessment were based on receiver-operating characteristic (ROC) curves. Cumulative GPA (nonstandardized regression coefficient [B]: 81.83; 95% confidence interval [CI]: 68.13 to 95.53) and international status (B: -37.40; 95% CI: -57.85 to -16.96) from 427 students were found to be statistically associated with increased IFOM CSE performance. Cumulative GPAs of 5.30 (area under ROC [AROC]: 0.77; 95% CI: 0.72 to 0.82) and 4.90 (AROC: 0.72; 95% CI: 0.66 to 0.78) were identified as being thresholds of significant risk for domestic and international students, respectively. Using cumulative GPA as a predictor of IFOM CSE performance and accommodating for differences in international status, it is possible to identify students who are at risk of failing to satisfy the National Board of Medical Examiners' International Standard of Competence.

  10. 'The industry must be inconspicuous': Japan Tobacco's corruption of science and health policy via the Smoking Research Foundation.

    Science.gov (United States)

    Iida, Kaori; Proctor, Robert N

    2018-02-04

    To investigate how and why Japan Tobacco, Inc. (JT) in 1986 established the Smoking Research Foundation (SRF), a research-funding institution, and to explore the extent to which SRF has influenced science and health policy in Japan. We analysed documents in the Truth Tobacco Industry Documents archive, along with recent Japanese litigation documents and published documents. JT's effort to combat effective tobacco control was strengthened in the mid-1980s, following privatisation of the company. While remaining under the protection of Japan's Ministry of Finance, the semiprivatised company lost its 'access to politicos', opening up a perceived need for collaboration with global cigarette makers. One solution, arrived at through clandestine planning with American companies, was to establish a third-party organisation, SRF, with the hope of capturing scientific and medical authority for the industry. Guarded by powerful people in government and academia, SRF was launched with the covert goal of influencing tobacco policy both inside and outside Japan. Scholars funded by SRF have participated in international conferences, national advisory committees and tobacco litigation, in most instances helping the industry to maintain a favourable climate for the continued sale of cigarettes. Contrary to industry claims, SRF was never meant to be independent or neutral. With active support from foreign cigarette manufacturers, SRF represents the expansion into Asia of the denialist campaign that began in the USA in 1953. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  11. ABIM Foundation

    Science.gov (United States)

    ... In conjunction with the… mailchi.mp View on Facebook ABIM Foundation shared Business Radio Powered by The Wharton School's post. 2 days ago View on Facebook ABIM Foundation 2 days ago The Android version ...

  12. From Data Privacy to Location Privacy

    Science.gov (United States)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  13. Privacy and human behavior in the age of information.

    Science.gov (United States)

    Acquisti, Alessandro; Brandimarte, Laura; Loewenstein, George

    2015-01-30

    This Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and behavioral sciences: people's uncertainty about the consequences of privacy-related behaviors and their own preferences over those consequences; the context-dependence of people's concern, or lack thereof, about privacy; and the degree to which privacy concerns are malleable—manipulable by commercial and governmental interests. Organizing our discussion by these themes, we offer observations concerning the role of public policy in the protection of privacy in the information age. Copyright © 2015, American Association for the Advancement of Science.

  14. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  15. Privacy in the Genomic Era.

    Science.gov (United States)

    Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W; Fellay, Jacques; Gunter, Carl A; Hubaux, Jean-Pierre; Malin, Bradley A; Wang, Xiaofeng

    2015-09-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.

  16. Privacy in the Genomic Era

    Science.gov (United States)

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  17. Comments from the Science Education Directorate, National Science Foundation: CAUSE, ISEP, and LOCI: Three-Program Approach to College-Level Science Improvement. II. Patterns and Problems.

    Science.gov (United States)

    Erickson, Judith B.; And Others

    1980-01-01

    Discusses patterns resulting from the monitor of science education proposals which may reflect problems or differing perceptions of NSF. Discusses these areas: proposal submissions from two-year institutions and social and behavioral scientists, trends in project content at the academic-industrial interface and in computer technology, and…

  18. Eighth-grade science teachers use of instructional time: Examining questions from the Third International Mathematics and Science Study (TIMSS) and comparing TIMSS and National Science Foundation questionnaires

    Science.gov (United States)

    Davidson, Anne Burgess

    Did the Third International Mathematics and Science Study (TIMSS) ask science teachers the right questions about their use of instructional time? Part I of this 2-part study used the TIMSS database to answer the question: Do 8th grade science teachers in the U.S., Czech Republic, Hungary, Japan, and Korea differ significantly in their perceived use of instructional time? Using the instructional activities in the TIMSS teacher question "How did the lesson proceed?" the teacher-reported times were analyzed using a repeated measures multivariate analysis. Significant differences were found between teacher-reported times in the U.S. and the other 4 TIMSS countries, whose 8th grade students outperformed U.S. students on TIMSS achievement tests. Post-hoc analysis indicated that TIMSS U.S. 8th grade science teachers report spending more time on homework in class, on group activities, and on lab activities, but less time on topic development, than TIMSS teachers from some or all of the other countries. Part II of this study further examined the question "How did the lesson proceed?" by videotaping 6 classes of 8th grade science in Alabama and Virginia and comparing observer coding of the video to the teachers' recalled descriptions of the same class. The difference between observer and teacher responses using TIMSS categories was not significant; however, 43% of the total variance was explained by whether the teacher or the observer reported the times for the instructional activities. The teachers also responded to questions from the NSF Local Systemic Change Through Teacher Enhancement K--8 Teacher Questionnaire to describe the same class. The difference found between the teacher and the observer coding was not significant, but the amount of variance explained by the data source (observer or teacher) dropped to 33% when using NSF student activity categories and to 26% when using NSF teacher activity categories. The conclusion of this study was that questionnaires to

  19. Risk assessment of student performance in the International Foundations of Medicine Clinical Science Examination by the use of statistical modeling

    Directory of Open Access Journals (Sweden)

    David MC

    2016-12-01

    Full Text Available Michael C David,1 Diann S Eley,2 Jennifer Schafer,2 Leo Davies,3 1School of Public Health, 2School of Medicine, The University of Queensland, Herston, QLD, 3Sydney Medical School, The University of Sydney, NSW, Australia Purpose: The primary aim of this study was to assess the predictive validity of cumulative grade point average (GPA for performance in the International Foundations of Medicine (IFOM Clinical Science Examination (CSE. A secondary aim was to develop a strategy for identifying students at risk of performing poorly in the IFOM CSE as determined by the National Board of Medical Examiners’ International Standard of Competence. Methods: Final year medical students from an Australian university medical school took the IFOM CSE as a formative assessment. Measures included overall IFOM CSE score as the dependent variable, cumulative GPA as the predictor, and the factors age, gender, year of enrollment, international or domestic status of student, and language spoken at home as covariates. Multivariable linear regression was used to measure predictor and covariate effects. Optimal thresholds of risk assessment were based on receiver-operating characteristic (ROC curves. Results: Cumulative GPA (nonstandardized regression coefficient [B]: 81.83; 95% confidence interval [CI]: 68.13 to 95.53 and international status (B: –37.40; 95% CI: –57.85 to –16.96 from 427 students were found to be statistically associated with increased IFOM CSE ­performance. Cumulative GPAs of 5.30 (area under ROC [AROC]: 0.77; 95% CI: 0.72 to 0.82 and 4.90 (AROC: 0.72; 95% CI: 0.66 to 0.78 were identified as being thresholds of significant risk for domestic and international students, respectively. Conclusion: Using cumulative GPA as a predictor of IFOM CSE performance and accommodating for differences in international status, it is possible to identify students who are at risk of failing to satisfy the National Board of Medical Examiners’ International

  20. Environmental Science and Research Foundation annual technical report to DOE-ID, January , 1995--December 31, 1995

    International Nuclear Information System (INIS)

    1996-06-01

    The foundation conducts an environmental monitoring and surveillance program over an area covering much of the upper Snake River Plain and provide environmental education and support services related to INEL natural resource issues. Also, the foundation, with its university affiliates, conducts ecological and radioecological research on the Idaho National Environmental Research Park. This research benefits major DOE-ID programs including waste management, environmental restoration, spent nuclear fuels, and land management issues. Major accomplishments during CY1995 can be divided into five categories: environmental surveillance program, environmental education, environmental services and support, ecological risk assessment, and research benefitting the DOE-ID mission

  1. Environmental Science and Research Foundation annual technical report to DOE-ID, January , 1995--December 31, 1995

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-06-01

    The foundation conducts an environmental monitoring and surveillance program over an area covering much of the upper Snake River Plain and provide environmental education and support services related to INEL natural resource issues. Also, the foundation, with its university affiliates, conducts ecological and radioecological research on the Idaho National Environmental Research Park. This research benefits major DOE-ID programs including waste management, environmental restoration, spent nuclear fuels, and land management issues. Major accomplishments during CY1995 can be divided into five categories: environmental surveillance program, environmental education, environmental services and support, ecological risk assessment, and research benefitting the DOE-ID mission.

  2. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  3. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  4. HSC Foundation

    Science.gov (United States)

    ... in disability information or services and that add value to our existing programs. The Foundation also works to bring additional support to initiatives by serving as funding partners on projects that have local impact and national relevance. Supporting a Continuum of Care The HSC Foundation ...

  5. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy

    Science.gov (United States)

    Koopman, Colin; Doty, Nick

    2016-01-01

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy’s disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy’s essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy’s multiple uses across multiple contexts. This article is part of the themed issue ‘The ethical impact of data science’. PMID:28336797

  6. Corporate Foundations

    DEFF Research Database (Denmark)

    Herlin, Heidi; Thusgaard Pedersen, Janni

    2013-01-01

    action between business and NGOs through convening, translation, collaboration, and mediation. Our study provides valuable insights into the tri-part relationship of company foundation NGO by discussing the implications of corporate foundations taking an active role in the realm of corporate social...... responsibility (CSR). The paper hence illuminates the fascinating and overlooked role of corporate foundations as potential bridges between business and civil society. It also informs theory on boundary organizations by clarifying challenges and limits of such institutions.......This paper aims to explore the potential of Danish corporate foundations as boundary organizations facilitating relationships between their founding companies and non-governmental organizations (NGOs). Hitherto, research has been silent about the role of corporate foundations in relation to cross...

  7. 10th December 2010 - German Delegation from the Novartis Foundation for Sustainable Development visiting the LHC superconducting magnet test hall with Technology Department S. Russenschuck and accompanied by Adviser for Life Sciences M. Dosanjh.

    CERN Multimedia

    Maximilien Brice

    2010-01-01

    10th December 2010 - German Delegation from the Novartis Foundation for Sustainable Development visiting the LHC superconducting magnet test hall with Technology Department S. Russenschuck and accompanied by Adviser for Life Sciences M. Dosanjh.

  8. Cooperation Agreement between the European Organization for Nuclear Research (CERN) and The Qatar Foundation for Education, Science and Community Development concerning Scientific and Technical Co-operation in High Energy Physics

    CERN Document Server

    2016-01-01

    Cooperation Agreement between the European Organization for Nuclear Research (CERN) and The Qatar Foundation for Education, Science and Community Development concerning Scientific and Technical Co-operation in High Energy Physics

  9. Foundation Structure

    DEFF Research Database (Denmark)

    2009-01-01

    Method of installing a bucket foundation structure comprising one, two, three or more skirts, into soils in a controlled manner. The method comprises two stages: a first stage being a design phase and the second stage being an installation phase. In the first stage, design parameters are determined...... relating to the loads on the finished foundation structure; soil profile on the location; allowable installation tolerances, which parameters are used to estimate the minimum diameter and length of the skirts of the bucket. The bucket size is used to simulate load situations and penetration into foundation...

  10. The General Philosophy Behind the New Integrated and Co-ordinated Science Courses in N.S.W. and the Science Foundation for Physics Textbook Series.

    Science.gov (United States)

    Messel, H.; Barker, E. N.

    Described are the science syllabuses and texts for the science courses written to fulfill the aims of the new system of education in the state of New South Wales, Australia. The science course was developed in two stages: (1) A four year integrated science syllabus for grades 7-10, and (2) separate courses in physics, chemistry, and biology with…

  11. Vasculitis Foundation

    Science.gov (United States)

    ... Our Board Our Team Anniversary Vasculitis Foundation Newsletters Annual Reports Press Page Literature Order Form Join Contact Us Dream Big Donate Donate Support the VF Through the Amazon Smile Program United Way Giving Ways to Give ...

  12. Marfan Foundation

    Science.gov (United States)

    ... The Marfan Foundation Marfan & Related Disorders What is Marfan Syndrome? What are Related Disorders? What are the Signs? ... Click to see what's happening around the country! Marfan syndrome is a life-threatening genetic disorder, and an ...

  13. CARES Foundation

    Science.gov (United States)

    ... Foundation Video Get Involved EMS and Newborn Screening campaigns Clincal trials Fundraisers Support groups Connect and promote with Social Media: Facebook , Twitter , Instagram and LinkedIn News & Notes from ...

  14. Through Patients' Eyes: Regulation, Technology, Privacy, and the Future.

    Science.gov (United States)

    Petersen, Carolyn

    2018-04-22

    Privacy is commonly regarded as a regulatory requirement achieved via technical and organizational management practices. Those working in the field of informatics often play a role in privacy preservation as a result of their expertise in information technology, workflow analysis, implementation science, or related skills. Viewing privacy from the perspective of patients whose protected health information is at risk broadens the considerations to include the perceived duality of privacy; the existence of privacy within a context unique to each patient; the competing needs inherent within privacy management; the need for particular consideration when data are shared; and the need for patients to control health information in a global setting. With precision medicine, artificial intelligence, and other treatment innovations on the horizon, health care professionals need to think more broadly about how to preserve privacy in a health care environment driven by data sharing. Patient-reported privacy preferences, privacy portability, and greater transparency around privacy-preserving functionalities are potential strategies for ensuring that privacy regulations are met and privacy is preserved. Georg Thieme Verlag KG Stuttgart.

  15. An overview of human genetic privacy.

    Science.gov (United States)

    Shi, Xinghua; Wu, Xintao

    2017-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed, not only for individuals but also for their families. In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data. We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions. © 2016 New York Academy of Sciences.

  16. Antithetic Foundations of Economics

    OpenAIRE

    Marin DINU

    2011-01-01

    This paper aims at decrypting the manner in which the foundations of Economics as a science and the meanings of the relevant explanatory formulas are being shaped. My analytical endeavor focuses on understanding the peculiarities of what is referred to as the object of study of the science known as Economics, an academic synthesis of concept-related breakthroughs regarding economicity. The explicit purpose of this analysis is to identify perennial benchmarks in economic c...

  17. BrightFocus Foundation

    Science.gov (United States)

    ... About BrightFocus Foundation Featured Content BrightFocus: Investing in Science to Save Mind and Sight We're here to help. Explore ... recognition is very important. Monday, November 6, 2017 New Diagnosis? Managing a mind and sight disease is a journey. And you’ ...

  18. Privacy and legal issues in cloud computing

    CERN Document Server

    Weber, Rolf H

    2015-01-01

    Adopting a multi-disciplinary and comparative approach, this book focuses on emerging and innovative attempts to tackle privacy and legal issues in cloud computing, such as personal data privacy, security and intellectual property protection. Leading international academics and practitioners in the fields of law and computer science examine the specific legal implications of cloud computing pertaining to jurisdiction, biomedical practice and information ownership. This collection offers original and critical responses to the rising challenges posed by cloud computing.

  19. [Continuous funding of National Natural Science Foundation of China has boosted the development of the discipline of ophthalmology over the past 25 years].

    Science.gov (United States)

    Jia, Ren-bing; Fan, Xian-qun; Xu, Yan-ying; Dong, Er-dan

    2012-02-01

    To analyze the role of National Natural Science Foundation of China (NSFC) on the development of the discipline of Ophthalmology from 1986 to 2010. Data on the total number of projects and funding of NSFC allocated to Ophthalmology, as well as papers published, awards, personnel training, subject construction were collected, and the role of NSFC on other sources of funding was evaluated. From 1986 to 2010, NSFC supported a total of 593 scientific research projects of Ophthalmology, funding a total amount of 152.44 million Yuan, among which were 371 free application projects, 156 Young Scientist Funds, 9 Key Programs, 5 National Science Fund for Distinguished Young Scholars, 3 Major international (regional) joint research programs, 1 Science Fund for Creative Research Group and 48 other projects. Over the past 25 years, the number of NSFC projects received by Ophthalmology has been an overall upward trend in the share in the Department of Life (Health) Sciences. Take the projects (186 of 292, 63.7%) as examples completed between 2002 and 2010, a total 262 papers were published in Science Citation Index (SCI) included journals and 442 papers were published in Chinese journals. Meanwhile, 8 Second prizes of National Science and Technology Progress Award and 1 State Technological Invention Award were received. As of 2010, the training of a total of more than 40 postdoctoral, more than 400 doctoral students and more than 600 graduate students have been completed. 5 national key disciplines and 1 national key laboratory have been built. Moreover, 2 "973" programs from Ministry of Science and Technology and 1 project of special fund in the public interest from Ministry of Public Health were obtained. 2 scholars were among the list of Yangtze Fund Scholars granted by Ministry of Education. Over the past 25 years, a full range of continuous funding from NSFC has led to fruitful results and a strong impetus to the progress of discipline of Ophthalmology.

  20. Is Electronic Privacy Achievable?

    National Research Council Canada - National Science Library

    Irvine, Cynthia E; Levin, Timothy E

    2000-01-01

    ... individuals. The purpose of this panel was to focus on how new technologies are affecting privacy. Technologies that might adversely affect privacy were identified by Rein Turn at previous symposia...

  1. SmartPrivacy for the smart grid : embedding privacy into the design of electricity conservation

    Energy Technology Data Exchange (ETDEWEB)

    Cavoukian, A. [Ontario Information and Privacy Commissioner, Toronto, ON (Canada); Polonetsky, J.; Wolf, C. [Future of Privacy Forum, Washington, DC (United States)

    2009-11-15

    Modernization efforts are underway to make the current electrical grid smarter. The future of the Smart Grid will be capable of informing consumers of their day-to-day energy use, curbing greenhouse gas emissions, and reducing consumers' energy bills. However, the Smart Grid also brings with it the possibility of collecting detailed information on individual energy consumption use and patterns within peoples' homes. This paper discussed the Smart Grid and its benefits, as well as the questions that should be examined regarding privacy. The paper also outlined the concept of SmartPrivacy and discussed its application to the Smart Grid scenario. Privacy by design foundational principles and Smart Grid components were also presented in an appendix. It was concluded that the information collected on a Smart Grid will form a library of personal information. The mishandling of this information could be extremely invasive of consumer privacy. 46 refs., 1 fig., 2 appendices.

  2. Privacy and Innovation

    OpenAIRE

    Avi Goldfarb; Catherine Tucker

    2011-01-01

    Information and communication technology now enables firms to collect detailed and potentially intrusive data about their customers both easily and cheaply. This means that privacy concerns are no longer limited to government surveillance and public figures' private lives. The empirical literature on privacy regulation shows that privacy regulation may affect the extent and direction of data-based innovation. We also show that the impact of privacy regulation can be extremely heterogeneous. T...

  3. Neuroethics and Brain Privacy

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2017-01-01

    An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology.......An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology....

  4. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  5. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  6. Foundations of data-intensive science: Technology and practice for high throughput, widely distributed, data management and analysis systems

    Science.gov (United States)

    Johnston, William; Ernst, M.; Dart, E.; Tierney, B.

    2014-04-01

    Today's large-scale science projects involve world-wide collaborations depend on moving massive amounts of data from an instrument to potentially thousands of computing and storage systems at hundreds of collaborating institutions to accomplish their science. This is true for ATLAS and CMS at the LHC, and it is true for the climate sciences, Belle-II at the KEK collider, genome sciences, the SKA radio telescope, and ITER, the international fusion energy experiment. DOE's Office of Science has been collecting science discipline and instrument requirements for network based data management and analysis for more than a decade. As a result of this certain key issues are seen across essentially all science disciplines that rely on the network for significant data transfer, even if the data quantities are modest compared to projects like the LHC experiments. These issues are what this talk will address; to wit: 1. Optical signal transport advances enabling 100 Gb/s circuits that span the globe on optical fiber with each carrying 100 such channels; 2. Network router and switch requirements to support high-speed international data transfer; 3. Data transport (TCP is still the norm) requirements to support high-speed international data transfer (e.g. error-free transmission); 4. Network monitoring and testing techniques and infrastructure to maintain the required error-free operation of the many R&E networks involved in international collaborations; 5. Operating system evolution to support very high-speed network I/O; 6. New network architectures and services in the LAN (campus) and WAN networks to support data-intensive science; 7. Data movement and management techniques and software that can maximize the throughput on the network connections between distributed data handling systems, and; 8. New approaches to widely distributed workflow systems that can support the data movement and analysis required by the science. All of these areas must be addressed to enable large

  7. Privacy and Library Records

    Science.gov (United States)

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  8. Privacy Verification Using Ontologies

    NARCIS (Netherlands)

    Kost, Martin; Freytag, Johann-Christoph; Kargl, Frank; Kung, Antonio

    2011-01-01

    As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a

  9. Sandia National Laboratories: Research: Research Foundations: Engineering

    Science.gov (United States)

    Foundations Bioscience Computing & Information Science Electromagnetics Engineering Science Geoscience Mexico Small Business Assistance Program Sandia Science & Technology Park Careers Community Library Events Careers View All Jobs Students & Postdocs Internships & Co-ops Fellowships

  10. Optimization Foundations and Applications

    CERN Document Server

    Miller, H Ronald

    2011-01-01

    A thorough and highly accessible resource for analysts in a broad range of social sciences. Optimization: Foundations and Applications presents a series of approaches to the challenges faced by analysts who must find the best way to accomplish particular objectives, usually with the added complication of constraints on the available choices. Award-winning educator Ronald E. Miller provides detailed coverage of both classical, calculus-based approaches and newer, computer-based iterative methods. Dr. Miller lays a solid foundation for both linear and nonlinear models and quickly moves on to dis

  11. Unleashing the Power of Science in Early Childhood: A Foundation for High-Quality Interactions and Learning

    Science.gov (United States)

    Greenfield, Daryl B.; Alexander, Alexandra; Frechette, Elizabeth

    2017-01-01

    When science is integrated into early childhood learning experiences, it becomes a critical area supporting young children's development. Young children are natural scientists, curious about their world, and they engage in scientific practices to learn about and explore their world. This article describes how the K-12 Framework for Science…

  12. [Overview of research projects funding in traditional Chinese medicine oncology field supported by National Natural Science Foundation of China].

    Science.gov (United States)

    Tang, Dong-Xin; Chen, Lian-Yu; Guo, Shu-Zhen; Han, Li-Wei; Zhang, Feng-Zhu

    2017-05-01

    In this paper, the funding situation of traditional Chinese medicine oncology research projects supported by National Natural Science Fund from 1986-2016 was reviewed. The characteristics of funded projects were summarized from funding amount, funding expenses, funding category, and the main research contents of projects, etc. At the same time, the main problems in the projects were analyzed in this paper, in order to provide reference for the relevant fund applicants. Copyright© by the Chinese Pharmaceutical Association.

  13. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2017-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  14. a History of Funding for WOMEN’S Programs at the National Science Foundation: from Individual Powre Approaches to the Advance of Institutional Approaches

    Science.gov (United States)

    Rosser, Sue V.; Lane, Eliesh O'neil

    The biennial reports on women, minorities, and persons with disabilities produced by the National Science Foundation (NSF) because of congressional mandate laid the statistical foundation for NSF initiatives to redress the underrepresentation of these groups. Programs established in the 1980s such as Research Opportunities for Women, Visiting Professorships for Women, Graduate Fellowships for Women, and Career Advancement Awards provided support to individual women for their research. In the 1990s, the NSF also began to focus on systemic initiatives, creating the Program for Women and Girls, although it continued to address the problem through support of individual researchers in the newly created Professional Opportunities for Women in Research and Education (POWRE) initiative. The responses from more than 400 awardees during the 4 years of POWRE provide insights into the current issues these women perceive surrounding their grants, funding, and interactions with NSF bureaucracy and staff members. The results of the POWRE survey support the institutional, systemic thrust of the NSF’s new ADVANCE initiative to attempt to solve problems such as balancing career and family that cannot be addressed solely by supporting research projects of individual female scientists and engineers.

  15. The integration of Mathematics, Science and Technology in early childhood education and the foundation phase: The role of the formation of the professional identities of beginner teachers

    Directory of Open Access Journals (Sweden)

    Marie Botha

    2015-02-01

    Full Text Available This article focuses on the professional identity formation of six beginner teachers (three in early childhood education and three in the foundation phase, involved in the teaching of Mathematics, Science and Technology (MST. Attention is in particular being paid to the role of professional identity in how they applied innovative teaching methods such as enquiry-based teaching. The study is based on the personal narratives of the six teachers, regarding their own learning experiences in MST, the impact of their professional training at an institution of higher education, as well as their first experiences as MST teachers in the workplace. A qualitative research design was applied and data was obtained through visual (photo collages and written stories, observation and interviews. Whilst all the teachers held negative attitudes towards Mathematics, this situation was turned around during their university training. The three teachers in early childhood education experienced their entrance to the profession as positive, due mainly to the support of colleagues in their application of innovative teaching methods. Two teachers in the foundation phase, however, experienced the opposite. The findings emphasise the complex processes in the moulding of a professional teacher identity and how teaching practices are influenced by these processes.

  16. An overview of human genetic privacy

    Science.gov (United States)

    Shi, Xinghua; Wu, Xintao

    2016-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed, not only for individuals but also for their families. In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data. We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions. PMID:27626905

  17. [Analysis of the application and funding projects of National Natural Science Foundation of China in the field of burns and plastic surgery from 2010 to 2016].

    Science.gov (United States)

    Zhang, Z C; Dou, D; Wang, X Y; Xie, D H; Yan, Z C

    2017-02-20

    We analyzed the data of application and funding projects of the National Natural Science Foundation of China (NSFC) during 2010-2016 in the field of burns and plastic surgery and summarized the NSFC funding pattern, the research hotspots, and weaknesses in this field. The NSFC has funded 460 projects in the field of burns and plastic surgery, with total funding of RMB 227.96 million. The scientific issues involved in the funding projects include orthotherapy against malformations, wound repair, basic research of burns, skin grafting, scars prevention, and regeneration of hair follicle and sweat glands. The research techniques involved in the funding projects are diversified. NSFC plays an important role in the scientific research and talents training in the field of burns and plastic surgery.

  18. [Analysis of hot spots and trend of molecular pharmacognosy research based on project supported by National Natural Science Foundation of 1995-2014].

    Science.gov (United States)

    Wang, Jun-Wen; Liu, Yang; Tong, Yuan-Yuan; Yang, Ce; Li, Hai-Yan

    2016-05-01

    This study collected 1995-2014 molecular pharmacognosy study, a total of 595 items, funded by Natural Science Foundation of China (NSFC). TDA and Excel software were used to analyze the data of the projects about general situation, hot spots of research with rank analytic and correlation analytic methods. Supported by NSFC molecular pharmacognosy projects and funding a gradual increase in the number of, the proportion of funds for pharmaceutical research funding tends to be stable; mainly supported by molecular biology methods of genuine medicinal materials, secondary metabolism and Germplasm Resources Research; hot drugs including Radix Salviae Miltiorrhizae, Radix Rehmanniae, Cordyceps sinensis, hot contents including tanshinone biosynthesis, Rehmannia glutinosa continuous cropping obstacle. Copyright© by the Chinese Pharmaceutical Association.

  19. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  20. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... FEDERAL RESERVE SYSTEM 12 CFR Part 261a [Docket No. R-1313] Privacy Act of 1974; Privacy Act... implementing the Privacy Act of 1974 (Privacy Act). The primary changes concern the waiver of copying fees... records under the Privacy Act; the amendment of special procedures for the release of medical records to...

  1. A Taxonomy of Privacy Constructs for Privacy-Sensitive Robotics

    OpenAIRE

    Rueben, Matthew; Grimm, Cindy M.; Bernieri, Frank J.; Smart, William D.

    2017-01-01

    The introduction of robots into our society will also introduce new concerns about personal privacy. In order to study these concerns, we must do human-subject experiments that involve measuring privacy-relevant constructs. This paper presents a taxonomy of privacy constructs based on a review of the privacy literature. Future work in operationalizing privacy constructs for HRI studies is also discussed.

  2. William James on a phenomenological psychology of immediate experience: the true foundation for a science of consciousness?

    Science.gov (United States)

    Taylor, Eugene

    2010-01-01

    Throughout his career, William James defended personal consciousness. In his "Principles of Psychology" (1890), he declared that psychology is the scientific study of states of consciousness as such and that he intended to presume from the outset that the thinker was the thought. But while writing it, he had been investigating a dynamic psychology of the subconscious, which found a major place in his Gifford Lectures, published as "The Varieties of Religious Experience" in 1902. This was the clearest statement James was able to make before he died with regard to his developing tripartite metaphysics of pragmatism, pluralism and radical empiricism, which essentially asked "Is a science of consciousness actually possible?" James's lineage in this regard, was inherited from an intuitive psychology of character formation that had been cast within a context of spiritual self-realization by the Swedenborgians and Transcendentalists of New England. Chief among these was his father, Henry James, Sr., and his godfather, Ralph Waldo Emerson. However, james was forced to square these ideas with the more rigorous scientific dictates of his day, which have endured to the present. As such, his ideas remain alive and vibrant, particularly among those arguing for the fusion of phenomenology, embodiment and cognitive neuroscience in the renewed search for a science of consciousness.

  3. Are personal health records safe? A review of free web-accessible personal health record privacy policies.

    Science.gov (United States)

    Carrión Señor, Inmaculada; Fernández-Alemán, José Luis; Toval, Ambrosio

    2012-08-23

    Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users' concerns regarding the privacy and security of their personal health information. To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users' accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low.

  4. The methodological foundations of mutual integration of scientific knowledge in the field of physical education and sports and related sciences.

    Directory of Open Access Journals (Sweden)

    Kozina Zh.L.

    2012-02-01

    Full Text Available Possibilities of application of scientific knowledge in physical education and sport in contiguous scientific directions are considered. The advanced studies of leading specialists in area of physical education and sport are analysed. It is rotined that on the modern stage scientific developments in area of physical education and sport attained a level, when can be utillized in fundamental and applied sciences. Scientific researches in area of physical education and sport to the application scientific areas, such as pedagogics, psychology, design, programming et al are related. One of examples of mutual integration of scientific knowledge in area of physical education and sport there is theoretical conception of individualization of preparation of sportsmen.

  5. Privacy and confidentiality in pragmatic clinical trials.

    Science.gov (United States)

    McGraw, Deven; Greene, Sarah M; Miner, Caroline S; Staman, Karen L; Welch, Mary Jane; Rubel, Alan

    2015-10-01

    With pragmatic clinical trials, an opportunity exists to answer important questions about the relative risks, burdens, and benefits of therapeutic interventions. However, concerns about protecting the privacy of this information are significant and must be balanced with the imperative to learn from the data gathered in routine clinical practice. Traditional privacy protections for research uses of identifiable information rely disproportionately on informed consent or authorizations, based on a presumption that this is necessary to fulfill ethical principles of respect for persons. But frequently, the ideal of informed consent is not realized in its implementation. Moreover, the principle of respect for persons—which encompasses their interests in health information privacy—can be honored through other mechanisms. Data anonymization also plays a role in protecting privacy but is not suitable for all research, particularly pragmatic clinical trials. In this article, we explore both the ethical foundation and regulatory framework intended to protect privacy in pragmatic clinical trials. We then review examples of novel approaches to respecting persons in research that may have the added benefit of honoring patient privacy considerations. © The Author(s) 2015.

  6. Designing Privacy for You : A User Centric Approach For Privacy

    OpenAIRE

    Senarath, Awanthika; Arachchilage, Nalin A. G.; Slay, Jill

    2017-01-01

    Privacy directly concerns the user as the data owner (data- subject) and hence privacy in systems should be implemented in a manner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy and embedding privacy into systems. However, none of them approaches privacy in a user- centered manner. Through this research we propose a framework that would enable developers and designers to grasp privacy in a user-centered manner and implement...

  7. Oral Traditions: A Contextual Framework for Complex Science Concepts--Laying the Foundation for a Paradigm of Promise in Rural Science Education

    Science.gov (United States)

    Avery, Leanne M.; Hains, Bryan J.

    2017-01-01

    The overarching goal of this paper is to bring a diverse educational context--rural sayings and oral traditions situated in ecological habitats--to light and emphasize that they need to be taken into consideration regarding twenty-first century science education. The rural sayings or tenets presented here are also considered alternative ways of…

  8. Regulating Online Data Privacy

    OpenAIRE

    Paul Reid

    2004-01-01

    With existing data protection laws proving inadequate in the fight to protect online data privacy and with the offline law of privacy in a state of change and uncertainty, the search for an alternative solution to the important problem of online data privacy should commence. With the inherent problem of jurisdiction that the Internet presents, such a solution is best coming from a multi-national body with the power to approximate laws in as many jurisdictions as possible, with a recognised au...

  9. Protecting genetic privacy.

    Science.gov (United States)

    Roche, P A; Annas, G J

    2001-05-01

    This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.

  10. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  11. Privacy in domestic environments

    OpenAIRE

    Radics, Peter J; Gracanin, Denis

    2011-01-01

    non-peer-reviewed While there is a growing body of research on privacy,most of the work puts the focus on information privacy. Physical and psychological privacy issues receive little to no attention. However, the introduction of technology into our lives can cause problems with regard to these aspects of privacy. This is especially true when it comes to our homes, both as nodes of our social life and places for relaxation. This paper presents the results of a study intended to captu...

  12. Privacy Training Program

    Science.gov (United States)

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  13. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  14. Web-Enabled Mechanistic Case Diagramming: A Novel Tool for Assessing Students' Ability to Integrate Foundational and Clinical Sciences.

    Science.gov (United States)

    Ferguson, Kristi J; Kreiter, Clarence D; Haugen, Thomas H; Dee, Fred R

    2018-02-20

    As medical schools move from discipline-based courses to more integrated approaches, identifying assessment tools that parallel this change is an important goal. The authors describe the use of test item statistics to assess the reliability and validity of web-enabled mechanistic case diagrams (MCDs) as a potential tool to assess students' ability to integrate basic science and clinical information. Students review a narrative clinical case and construct an MCD using items provided by the case author. Students identify the relationships among underlying risk factors, etiology, pathogenesis and pathophysiology, and the patients' signs and symptoms. They receive one point for each correctly-identified link. In 2014-15 and 2015-16, case diagrams were implemented in consecutive classes of 150 medical students. The alpha reliability coefficient for the overall score, constructed using each student's mean proportion correct across all cases, was 0.82. Discrimination indices for each of the case scores with the overall score ranged from 0.23 to 0.51. In a G study using those students with complete data (n = 251) on all 16 cases, 10% of the variance was true score variance, and systematic case variance was large. Using 16 cases generated a G coefficient (relative score reliability) equal to .72 and a Phi equal to .65. The next phase of the project will involve deploying MCDs in higher-stakes settings to determine whether similar results can be achieved. Further analyses will determine whether these assessments correlate with other measures of higher-order thinking skills.

  15. Oral traditions: a contextual framework for complex science concepts—laying the foundation for a paradigm of promise in rural science education

    Science.gov (United States)

    Avery, Leanne M.; Hains, Bryan J.

    2017-03-01

    The overarching goal of this paper is to bring a diverse educational context—rural sayings and oral traditions situated in ecological habitats—to light and emphasize that they need to be taken into consideration regarding twenty-first century science education. The rural sayings or tenets presented here are also considered alternative ways of learning and knowing that rural people (elders and children) acquire outside of school in rural places of home and habitat. Throughout this paper we explore the complex nature of rural sayings or tenets that have been shared by community elders and examine their historic scientific roots. In so doing, we uncover a wealth of information regarding the diverse rural sociocultural and ecological connections and the situated macro and micro-contexts from which these tenets arise. We argue for a preservation and educational revitalization of these tenets for current and future generations. We show how this knowledge both augments and differs from traditional western science and science curricula by illuminating the ways in which oral traditions are embedded in place, people, memory and culture. We close by presenting an alternative paradigm for science education that incorporates pluralism as a means to enrich current place-based pedagogies and practices. We suggest that in order to tackle the complex problems in this new age of the Anthropocene, revitalizing elders' wisdom as well as valuing rural children's diverse knowledge and the inherent connectivity to their habitats needs be cultivated and not expunged by the current trends that standardize learning. As stated in the call for this special issue, "rurality has a real positionality" and much can be learned from individual and unique rural contexts.

  16. Protecting Information: The Role of Community Colleges in Cybersecurity Education. A Report from a Workshop Sponsored by the National Science Foundation and the American Association of Community Colleges (Washington, DC, June 26-28, 2002).

    Science.gov (United States)

    American Association of Community Colleges, Washington, DC.

    The education and training of the cybersecurity workforce is an essential element in protecting the nation's computer and information systems. On June 26-28, 2002, the National Science Foundation supported a cybersecurity education workshop hosted by the American Association of Community Colleges. The goals of the workshop were to map out the role…

  17. Privacy enhanced recommender system

    NARCIS (Netherlands)

    Erkin, Zekeriya; Erkin, Zekeriya; Beye, Michael; Veugen, Thijs; Lagendijk, Reginald L.

    2010-01-01

    Recommender systems are widely used in online applications since they enable personalized service to the users. The underlying collaborative filtering techniques work on user’s data which are mostly privacy sensitive and can be misused by the service provider. To protect the privacy of the users, we

  18. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  19. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for

  20. An Investigation of How Black STEM Faculty at Historically Black Colleges and Universities Approach the National Science Foundation Merit Review Process

    Science.gov (United States)

    Rankins, Falcon

    This qualitative inquiry explored the ways in which US-born, Black faculty member participants in science, technology, engineering, and mathematics (STEM) disciplines at Historically Black Colleges and Universities (HBCUs) interact with the National Science Foundation (NSF). Eight Black HBCU STEM faculty members with a range of involvement in NSF-related activities were individually interviewed. Topics of discussion with participants included their prior experiences with NSF, their understanding of the merit review process, and their understanding of their personal and institutional relationships with NSF and the STEM community. Two broad findings emerged from the conversations. The first was that issues of communities and social identity were important to the participants' work as research scientists. Participants prioritized advancing people and communities over advancing the knowledge of ambiguous, disembodied scientific disciplines, and some participants were motivated by interests in social justice. However, participants maintained strong identities as scientists and the discussions provided no evidence that other social factors influenced their application of the scientific method. The second major finding dealt with the role participants perceived their institutions playing in their involvement with NSF. All participants described challenges associated with pursuing research in HBCU environments and, in some cases, the institutional challenges served as the motivation for participants' projects, with varying consequences. The participants' discussions about their institutions also raised important questions about how well-aligned participants' visions are with the visions of their institutional leadership, regarding how research should be incorporated into the HBCU mission. Finally, this study developed and refined a theoretical framework for explaining the underrepresentation of HBCUs in NSF funding streams. In developing this framework, a brief history of

  1. Global benchmarking of medical student learning outcomes? Implementation and pilot results of the International Foundations of Medicine Clinical Sciences Exam at The University of Queensland, Australia.

    Science.gov (United States)

    Wilkinson, David; Schafer, Jennifer; Hewett, David; Eley, Diann; Swanson, Dave

    2014-01-01

    To report pilot results for international benchmarking of learning outcomes among 426 final year medical students at the University of Queensland (UQ), Australia. Students took the International Foundations of Medicine (IFOM) Clinical Sciences Exam (CSE) developed by the National Board of Medical Examiners, USA, as a required formative assessment. IFOM CSE comprises 160 multiple-choice questions in medicine, surgery, obstetrics, paediatrics and mental health, taken over 4.5 hours. Significant implementation issues; IFOM scores and benchmarking with International Comparison Group (ICG) scores and United States Medical Licensing Exam (USMLE) Step 2 Clinical Knowledge (CK) scores; and correlation with UQ medical degree cumulative grade point average (GPA). Implementation as an online exam, under university-mandated conditions was successful. Mean IFOM score was 531.3 (maximum 779-minimum 200). The UQ cohort performed better (31% scored below 500) than the ICG (55% below 500). However 49% of the UQ cohort did not meet the USMLE Step 2 CK minimum score. Correlation between IFOM scores and UQ cumulative GPA was reasonable at 0.552 (p benchmarking is feasible and provides a variety of useful benchmarking opportunities.

  2. Study of the National Science Foundation's South Pole Station as an analogous data base for the logistical support of a Moon laboratory

    Science.gov (United States)

    Hickam, H. H., Jr.

    1993-01-01

    The day will come when the United States will want to return to the Earth's Moon. When that occurs, NASA may look to the Apollo program for technical and inspirational guidance. The Apollo program, however, was designed to be an end to itself--the landing of a man on the Moon and his return safely within the decade of the 1960's. When that was accomplished, the program folded because it was not self-sustaining. The next time we return to the Moon, we should base our planning on a program that is designed to be a sustained effort for an indefinite period. It is the thrust of this report that the South Pole Station of the National Science Foundation can be used to develop analogs for the construction, funding, and logistical support of a lunar base. Other analogs include transportation and national efforts versus international cooperation. A recommended lunar base using the South Pole Station as inspiration is provided, as well as details concerning economical construction of the base over a 22-year period.

  3. Use of international foundations of medicine clinical sciences examination to evaluate students' performance in the local examination at the University of Sharjah, United Arab Emirates.

    Science.gov (United States)

    Dash, Nihar Ranjan; Abdalla, Mohamed Elhassan; Hussein, Amal

    2017-01-01

    Several medical schools around the world are moving away from isolated, locally developed in-house assessments to the introduction of external examinations into their curriculum. Although the objective varies, it is typically done to evaluate, audit, and compare students' performance to international standards. Similarly, the International Foundations of Medicine-Clinical Sciences Examination (IFOM-CSE) was introduced in the College of Medicine at the University of Sharjah as an external assessment criterion in addition to the existing in-house assessments. The aim of this study was to compare the student performance in this newly introduced IFOM-CSE examination and the existing in-house final examination in the college. The scores of three consecutive final-year undergraduate medical student batches (2013-2015) who took both the IFOM-CSE and the existing in-house final examination were analyzed. Pearson correlation and one-way analysis of variance test were conducted using SPSS 22. The students' scores in the IFOM-CSE and in the final examination prepared locally were highly correlated with Pearson correlation coefficients of 0.787 for batch 2013, 0.827 for batch 2014, and 0.830 for batch 2015 (P correlated with their scores in the IFOM-CSE over all the three batches. Thus, introduction of external examination can be an important evaluation tool to a comprehensive internal assessment system providing evidence of external validity.

  4. Privacy under construction : A developmental perspective on privacy perception

    NARCIS (Netherlands)

    Steijn, W.M.P.; Vedder, A.H.

    2015-01-01

    We present a developmental perspective regarding the difference in perceptions toward privacy between young and old. Here, we introduce the notion of privacy conceptions, that is, the specific ideas that individuals have regarding what privacy actually is. The differences in privacy concerns often

  5. Polish Foundation for Energy Efficiency

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-31

    The Polish Foundation for Energy Efficiency (FEWE) was established in Poland at the end of 1990. FEWE, as an independent and non-profit organization, has the following objectives: to strive towards an energy efficient national economy, and to show the way and methods by use of which energy efficiency can be increased. The activity of the Foundation covers the entire territory of Poland through three regional centers: in Warsaw, Katowice and Cracow. FEWE employs well-known and experienced specialists within thermal and power engineering, civil engineering, economy and applied sciences. The organizer of the Foundation has been Battelle Memorial Institute - Pacific Northwest Laboratories from the USA.

  6. Molecular Energy and Environmental Science: A Workshop Sponsored by The National Science Foundation and The Department of Energy May 26-27, 1999 in Rosemont, Illinois

    Energy Technology Data Exchange (ETDEWEB)

    Stair, Peter C [Northwestern Univ., Evanston, IL (United States); DeSimone, Joseph M. [University of North Carolina Chapel Hill; Frost, John W. [Michigan State Univ., East Lansing, MI (United States)

    1999-05-26

    Energy and the environment pose major scientific and technological challenges for the 21st century. New technologies for increasing the efficiency of harvesting and utilizing energy resources are essential to the nation’s economic competitiveness. At the same time, the quality of life in the United States depends inherently on the environmental impact of energy production and utilization. This interdependence makes it imperative to develop a better understanding of the environment and new strategies for minimizing the impact of energy-related activities. Recent advances in techniques for the synthesis and characterization of chemicals and materials and for the molecular control of biological organisms make it possible, for the first time, to address this imperative. Chemistry, with its focus on the molecular level, plays a central role in addressing the needs for fundamental understanding and technology development in both the energy and environmental fields. Understanding environmental processes and consequences requires studying natural systems, rather than focussing exclusively on laboratory models. Natural systems and their complexity pose an enormous, perhaps the ultimate, challenge to chemists, and will provide them with varied and exciting new problems for years to come. In addition, the complexity of the underlying systems and processes often requires multi-disciplinary programs that bridge the interfaces between chemistry and other disciplines. (See Figure 1) This has ramifications in the approach to funding research and suggests needs for broadening the educational training of future scientists and engineers in these programs. Figure 1. NSF and DOE should consider sponsoring research centers and focused research groups organized to optimize their impact on Technological Challenges of national interest. The research will have significant impact if it addresses issues of fundamental molecular science in one or more Enabling Research Areas. Approximately 7

  7. [Analysis of funding of projects on obstetrics and gynecology supported by National Natural Science Foundation of China from 2007 to 2016].

    Science.gov (United States)

    Qin, S H; Huang, Q S; Yao, S Z

    2017-04-25

    Objective: To summarize the funding of scientific research projects on obstetrics and gynecology by National Natural Science Foundation of China (NSFC) from 2007 to 2016 and to display the hotspots of scientific research on obstetrics and gynecology. Methods: A systemic search was performed for the information of projects supported by NSFC from 2007 to 2016. The indicators for analysis included the number of projects, total investment, project categories, research units and research field. The research direction of each project was decided based on title, summary and key words provided by the profile of each project. Results: The total investment on obstetrics and gynecology by NSFC was 23.214 million with a total of 82 projects in 2007. It increased year by year and reached the peak in 2014 (359 projects 208.990 million). The investment and number of projects remained stable after 2014. General projects (1 109 projects 608.000 million) formed the majority of projects. Youth science fund projects (1 035 projects 214.976 million) increased steadily and the number was nearly equal to general projects. There were only a small amount of key projects (20 projects 54.720 million) and major projects (7 projects 38.400 million). The investment varied in different research units. The greatest 10 units (less than 6% of total), including 7 comprehensive universities, 2 medical universities and 1 institute of medicine, got 1 113 projects invested (43.84% of total, 1 113/2 539). The hot areas like gynecological tumor (920 projects 350.615 million), hypertensive disorders complicating pregnancy (91 projects 37.470 million) and polycystic ovarian syndrome (77 projects 29.540 million) were more likely to receive investment, while some interdisciplinary science like maternal and child health (28 projects 12.050 million), imaging and biomedicine (37 projects 14.770 million) began to achieve attention in recent years. Conclusions: The number of researches invested will be increased

  8. Mathematical foundation of computer science

    CERN Document Server

    Singh, YN

    2005-01-01

    The interesting feature of this book is its organization and structure. That consists of systematizing of the definitions, methods, and results that something resembling a theory. Simplicity, clarity, and precision of mathematical language makes theoretical topics more appealing to the readers who are of mathematical or non-mathematical background. For quick references and immediate attentions¾concepts and definitions, methods and theorems, and key notes are presented through highlighted points from beginning to end. Whenever, necessary and probable a visual approach of presentation is used. The amalgamation of text and figures make mathematical rigors easier to understand. Each chapter begins with the detailed contents, which are discussed inside the chapter and conclude with a summary of the material covered in the chapter. Summary provides a brief overview of all the topics covered in the chapter. To demonstrate the principles better, the applicability of the concepts discussed in each topic are illustrat...

  9. National Science Foundation Assistant Director for Mathematics and Physical Sciences Tony Chan (USA) visiting CMS experiment on 23rd May 2007 with Spokesperson T. Virdee, Deputy Spokesperson R. Cousins, Advisor to CERN Director-General J. Ellis, US CMS Research Program Deputy Manager D. Marlow and FNAL D. Green

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    National Science Foundation Assistant Director for Mathematics and Physical Sciences Tony Chan (USA) visiting CMS experiment on 23rd May 2007 with Spokesperson T. Virdee, Deputy Spokesperson R. Cousins, Advisor to CERN Director-General J. Ellis, US CMS Research Program Deputy Manager D. Marlow and FNAL D. Green

  10. Control use of data to protect privacy.

    Science.gov (United States)

    Landau, Susan

    2015-01-30

    Massive data collection by businesses and governments calls into question traditional methods for protecting privacy, underpinned by two core principles: (i) notice, that there should be no data collection system whose existence is secret, and (ii) consent, that data collected for one purpose not be used for another without user permission. But notice, designated as a fundamental privacy principle in a different era, makes little sense in situations where collection consists of lots and lots of small amounts of information, whereas consent is no longer realistic, given the complexity and number of decisions that must be made. Thus, efforts to protect privacy by controlling use of data are gaining more attention. I discuss relevant technology, policy, and law, as well as some examples that can illuminate the way. Copyright © 2015, American Association for the Advancement of Science.

  11. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  12. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  13. Privacy Attitudes among Early Adopters of Emerging Health Technologies.

    Directory of Open Access Journals (Sweden)

    Cynthia Cheung

    Full Text Available Advances in health technology such as genome sequencing and wearable sensors now allow for the collection of highly granular personal health data from individuals. It is unclear how people think about privacy in the context of these emerging health technologies. An open question is whether early adopters of these advances conceptualize privacy in different ways than non-early adopters.This study sought to understand privacy attitudes of early adopters of emerging health technologies.Transcripts from in-depth, semi-structured interviews with early adopters of genome sequencing and health devices and apps were analyzed with a focus on participant attitudes and perceptions of privacy. Themes were extracted using inductive content analysis.Although interviewees were willing to share personal data to support scientific advancements, they still expressed concerns, as well as uncertainty about who has access to their data, and for what purpose. In short, they were not dismissive of privacy risks. Key privacy-related findings are organized into four themes as follows: first, personal data privacy; second, control over personal information; third, concerns about discrimination; and fourth, contributing personal data to science.Early adopters of emerging health technologies appear to have more complex and nuanced conceptions of privacy than might be expected based on their adoption of personal health technologies and participation in open science. Early adopters also voiced uncertainty about the privacy implications of their decisions to use new technologies and share their data for research. Though not representative of the general public, studies of early adopters can provide important insights into evolving attitudes toward privacy in the context of emerging health technologies and personal health data research.

  14. Privacy Attitudes among Early Adopters of Emerging Health Technologies.

    Science.gov (United States)

    Cheung, Cynthia; Bietz, Matthew J; Patrick, Kevin; Bloss, Cinnamon S

    2016-01-01

    Advances in health technology such as genome sequencing and wearable sensors now allow for the collection of highly granular personal health data from individuals. It is unclear how people think about privacy in the context of these emerging health technologies. An open question is whether early adopters of these advances conceptualize privacy in different ways than non-early adopters. This study sought to understand privacy attitudes of early adopters of emerging health technologies. Transcripts from in-depth, semi-structured interviews with early adopters of genome sequencing and health devices and apps were analyzed with a focus on participant attitudes and perceptions of privacy. Themes were extracted using inductive content analysis. Although interviewees were willing to share personal data to support scientific advancements, they still expressed concerns, as well as uncertainty about who has access to their data, and for what purpose. In short, they were not dismissive of privacy risks. Key privacy-related findings are organized into four themes as follows: first, personal data privacy; second, control over personal information; third, concerns about discrimination; and fourth, contributing personal data to science. Early adopters of emerging health technologies appear to have more complex and nuanced conceptions of privacy than might be expected based on their adoption of personal health technologies and participation in open science. Early adopters also voiced uncertainty about the privacy implications of their decisions to use new technologies and share their data for research. Though not representative of the general public, studies of early adopters can provide important insights into evolving attitudes toward privacy in the context of emerging health technologies and personal health data research.

  15. National Privacy Research Strategy

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — On July 1, NITRD released the National Privacy Research Strategy. Research agencies across government participated in the development of the strategy, reviewing...

  16. Cybersecurity and Privacy

    DEFF Research Database (Denmark)

    he huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at the company and at individual level. Cybersecurity and Privacy – bridging the gap addresses...... two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others....... Policies, frameworks, strategies, laws, tools, techniques, and technologies – all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject...

  17. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  18. [Statistics and analysis on acupuncture and moxibustion projects of the National Natural Science Foundation of China of traditional Chinese medicine universities and colleges in recent 10 years: taking the General Program and National Science Fund for Young Scholars as examples].

    Science.gov (United States)

    Li, Qingling; Ma, Qiang; Li, Dan; Liu, Nana; Yang, Jiahui; Sun, Chun; Cheng, Cheng; Jia, Xuezhao; Wang, Jing; Zeng, Yonglei

    2018-03-12

    To analyze statistically the situation of the National Natural Science Foundation of China (NSFC) from 2007 to 2016 in the field of acupuncture and moxibustion for supporting the national Universities colleges of traditional Chinese medicine on the General Program (GP) and the National Science Fund for Young Scholars (NSFYS). In view of five aspects, named fund, supporting units, key words, method, disorder and signal path, the differences were compared between GP and NSFYS, the following characteristics were summarized. ① The fund aid was increased from 2007 through 2013 and down-regulated from 2013 through 2016. In recent ten years, the funding condition was fluctuated, but increasing in tendency generally. ② The relevant projects of the same research direction had been approved continuously for over 3 years in a part of TCM universities, in which, the research continuity was the hot topic. ③ Regarding the therapeutic methods, acupuncture was the chief therapy; electroacupuncture, moxibustion and acupoints were involved as well. ④ The disorders involved in the research were cerebral ischemia, myocardial ischemia and reperfusion injury. It is suggested that the ischemic disorder is predominated in the research. ⑤ The signal path occupied the main research index system, including cell proliferation, metabolism, immune, apoptosis and autophagy. The researches on the other aspects were less.

  19. Certificate Transparency with Privacy

    Directory of Open Access Journals (Sweden)

    Eskandarian Saba

    2017-10-01

    Full Text Available Certificate transparency (CT is an elegant mechanism designed to detect when a certificate authority (CA has issued a certificate incorrectly. Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues. First, we develop a mechanism that enables web browsers to audit a CT log without violating user privacy. Second, we extend CT to support non-public subdomains.

  20. Mesothelioma Applied Research Foundation

    Science.gov (United States)

    ... Foundation Experts Can Answer Your Questions! The Mesothelioma Applied Research Foundation's team of experts is available to answer ... a law firm. Read more about the Mesothelioma Applied Research Foundation . TO GET HELP CALL: (877) End-Meso ...

  1. Foundations of resilience thinking.

    Science.gov (United States)

    Curtin, Charles G; Parker, Jessica P

    2014-08-01

    Through 3 broad and interconnected streams of thought, resilience thinking has influenced the science of ecology and natural resource management by generating new multidisciplinary approaches to environmental problem solving. Resilience science, adaptive management (AM), and ecological policy design (EPD) contributed to an internationally unified paradigm built around the realization that change is inevitable and that science and management must approach the world with this assumption, rather than one of stability. Resilience thinking treats actions as experiments to be learned from, rather than intellectual propositions to be defended or mistakes to be ignored. It asks what is novel and innovative and strives to capture the overall behavior of a system, rather than seeking static, precise outcomes from discrete action steps. Understanding the foundations of resilience thinking is an important building block for developing more holistic and adaptive approaches to conservation. We conducted a comprehensive review of the history of resilience thinking because resilience thinking provides a working context upon which more effective, synergistic, and systems-based conservation action can be taken in light of rapid and unpredictable change. Together, resilience science, AM, and EPD bridge the gaps between systems analysis, ecology, and resource management to provide an interdisciplinary approach to solving wicked problems. © 2014 Society for Conservation Biology.

  2. Ultraviolet and visible radiation at Barrow, Alaska: Climatology and influencing factors on the basis of version 2 National Science Foundation network data

    Science.gov (United States)

    Bernhard, Germar; Booth, Charles R.; Ehramjian, James C.; Stone, Robert; Dutton, Ellsworth G.

    2007-05-01

    Spectral ultraviolet (UV) and visible irradiance has been measured near Barrow, Alaska (71°N, 157°W), between 1991 and 2005 with a SUV-100 spectroradiometer. The instrument is part of the U.S. National Science Foundation's UV Monitoring Network. Here we present results based on the recently produced "version 2" data release, which supersedes published "version 0" data. Cosine error and wavelength-shift corrections applied to the new version increased biologically effective UV dose rates by 0-10%. Corrected clear-sky measurements of different years are typically consistent to within ±3%. Measurements were complemented with radiative transfer model calculations to retrieve total ozone and surface albedo from measured spectra and for the separation of the different factors influencing UV and visible radiation. A climatology of UV and visible radiation was established, focusing on annual cycles, trends, and the effect of clouds. During several episodes in spring of abnormally low total ozone, the daily UV dose at 305 nm exceeded the climatological mean by up to a factor of 2.6. Typical noontime UV Indices during summer vary between 2 and 4; the highest UV Index measured was 5.0 and occurred when surface albedo was unusually high. Radiation levels in the UV-A and visible exhibit a strong spring-autumn asymmetry. Irradiance at 345 nm peaks on approximately 20 May, 1 month before the solstice. This asymmetry is caused by increased cloudiness in autumn and high albedo in spring, when the snow covered surface enhances downwelling UV irradiance by up to 57%. Clouds reduce UV radiation at 345 nm on average by 4% in March and by more than 40% in August. Aerosols reduce UV by typically 5%, but larger reductions were observed during Arctic haze events. Stratospheric aerosols from the Pinatubo eruption in 1991 enhanced spectral irradiance at 305 nm for large solar zenith angles. The year-to-year variations of spectral irradiance at 305 nm and of the UV Index are mostly caused

  3. Employees' satisfaction as influenced by acoustic and visual privacy in the open office environment

    Science.gov (United States)

    Soules, Maureen Jeanette

    The purpose of this study was to examine the relationship between employees' acoustic and visual privacy issues and their perceived satisfaction in their open office work environments while in focus work mode. The study examined the Science Teaching Student Services Building at the University of Minnesota Minneapolis. The building houses instructional classrooms and administrative offices that service UMN students. The Sustainable Post-Occupancy Evaluation Survey was used to collect data on overall privacy conditions, acoustic and visual privacy conditions, and employees' perceived privacy conditions while in their primary workplace. Paired T-tests were used to analyze the relationships between privacy conditions and employees' perceptions of privacy. All hypotheses are supported indicating that the privacy variables are correlated to the employees' perception of satisfaction within the primary workplace. The findings are important because they can be used to inform business leaders, designers, educators and future research in the field of office design.

  4. Oceans and Human Health (OHH): a European perspective from the Marine Board of the European Science Foundation (Marine Board-ESF).

    Science.gov (United States)

    Moore, Michael N; Depledge, Michael H; Fleming, Lora; Hess, Philipp; Lees, David; Leonard, Paul; Madsen, Lise; Owen, Richard; Pirlet, Hans; Seys, Jan; Vasconcelos, Vitor; Viarengo, Aldo

    2013-05-01

    will impact adversely on efforts to alleviate poverty, sustain the availability of environmental goods and services and improve health and social and economic stability; and thus, will impinge on many policy decisions, both nationally and internationally. Knowledge exchange (KE) will be a key element of any ensuing research. KE will facilitate the integration of biological, medical, epidemiological, social and economic disciplines, as well as the emergence of synergies between seemingly unconnected areas of science and socio-economic issues, and will help to leverage knowledge transfer across the European Union (EU) and beyond. An integrated interdisciplinary systems approach is an effective way to bring together the appropriate groups of scientists, social scientists, economists, industry and other stakeholders with the policy formulators in order to address the complexities of interfacial problems in the area of environment and human health. The Marine Board of the European Science Foundation Working Group on "Oceans and Human Health" has been charged with developing a position paper on this topic with a view to identifying the scientific, social and economic challenges and making recommendations to the EU on policy-relevant research and development activities in this arena. This paper includes the background to health-related issues linked to the coastal environment and highlights the main arguments for an ecosystem-based whole systems approach.

  5. An informational theory of privacy

    NARCIS (Netherlands)

    Schottmuller, C.; Jann, Ole

    2016-01-01

    We develop a theory that explains how and when privacy can increase welfare. Without privacy, some individuals misrepresent their preferences, because they will otherwise be statistically discriminated against. This "chilling effect" hurts them individually, and impairs information aggregation. The

  6. Privacy in social networking sites

    OpenAIRE

    Λεονάρδος, Γεώργιος; Leonardos, Giorgos

    2016-01-01

    The purpose of this study is to explore the aspects of privacy over the use of social networks web sites. More specific, we will show the types of social networks, their privacy mechanisms that are different in each social network site, their privacy options that are offered to users. We will report some serious privacy violations incidents of the most popular social networks sites such as Facebook, Twitter, LinkedIn. Also, we will report some important surveys about social networks and pr...

  7. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Science.gov (United States)

    2012-05-25

    ... presentations, including the privacy compliance fundamentals, privacy and data security, and the privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Privacy Compliance... Homeland Security Privacy Office will host a public workshop, ``Privacy Compliance Workshop.'' DATES: The...

  8. Foundations of combinatorics with applications

    CERN Document Server

    Bender, Edward A

    2006-01-01

    This introduction to combinatorics, the foundation of the interaction between computer science and mathematics, is suitable for upper-level undergraduates and graduate students in engineering, science, and mathematics.The four-part treatment begins with a section on counting and listing that covers basic counting, functions, decision trees, and sieving methods. The following section addresses fundamental concepts in graph theory and a sampler of graph topics. The third part examines a variety of applications relevant to computer science and mathematics, including induction and recursion, sorti

  9. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  10. Advertising and Invasion of Privacy.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  11. Privacy in an Ambient World

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  12. 76 FR 59073 - Privacy Act

    Science.gov (United States)

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency...-1379. SUPPLEMENTARY INFORMATION: Consistent with the Privacy Act (PA), the CIA has undertaken and...

  13. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  14. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  15. An overview of human genetic privacy

    OpenAIRE

    Shi, Xinghua; Wu, Xintao

    2016-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that nee...

  16. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  17. Research Award: Foundations for Innovation | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-09-07

    Sep 7, 2016 ... The Foundations for Innovation program wishes to better ... disciplines: science, technology and innovation policy; development studies; or economics. ... research to local, national, and/or regional policy debates in Africa.

  18. Privacy Bridges: EU and US Privacy Experts In Search of Transatlantic Privacy Solutions

    NARCIS (Netherlands)

    Abramatic, J.-F.; Bellamy, B.; Callahan, M.E.; Cate, F.; van Eecke, P.; van Eijk, N.; Guild, E.; de Hert, P.; Hustinx, P.; Kuner, C.; Mulligan, D.; O'Connor, N.; Reidenberg, J.; Rubinstein, I.; Schaar, P.; Shadbolt, N.; Spiekermann, S.; Vladeck, D.; Weitzner, D.J.; Zuiderveen Borgesius, F.; Hagenauw, D.; Hijmans, H.

    2015-01-01

    The EU and US share a common commitment to privacy protection as a cornerstone of democracy. Following the Treaty of Lisbon, data privacy is a fundamental right that the European Union must proactively guarantee. In the United States, data privacy derives from constitutional protections in the

  19. Natural sciences in the focus IV. Foundations of atomistics, quantum mechanics, and chemistry; Naturwissenschaften im Fokus IV. Grundlagen der Atomistik, Quantenmechanik und Chemie

    Energy Technology Data Exchange (ETDEWEB)

    Petersen, Christian

    2017-07-01

    The following topics are dealt with: The electronic structure of the atom, the structure of the atomic nucleus together with radioactive decays, fission, and fusion, the elementary particles together with the standard model, the atomistic foundations of chemistrytogether with the binding types, and inorganic and organic chemistry. (HSI)

  20. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  1. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  2. Privacy Policy | FNLCR Staging

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  3. Privacy preserving interactive record linkage (PPIRL).

    Science.gov (United States)

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human-machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human-machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility.

  4. Foundations for renewables

    Energy Technology Data Exchange (ETDEWEB)

    Neidlein, H.C. [German Agency Scherer Schnell Walser und Partner (Germany)

    2007-07-01

    In Germany, 77 foundations promote renewable energy technology with around Euro 25 million annually. The most important internationally active foundations, however, can be found in the Anglo-Saxon countries. (orig.)

  5. Toxicology Education Foundation

    Science.gov (United States)

    ... bodies and our world. Welcome to the Toxicology Education Foundation! Our mission is to enhance public understanding ... In with us, follow our Tweets, choose Toxicology Education Foundation as your preferred charity through Smile.Amazon. ...

  6. Skin Cancer Foundation

    Science.gov (United States)

    ... Host a Fundraising Event | About Us | Store The Skin Cancer Foundation The Skin Cancer Foundation is the ... Handbook A "Sunscreen Gene"? Skin Cancer Facts & Statistics Skin Cancer Treatment Glossary Information on medications and procedures ...

  7. Robert Wood Johnson Foundation

    Science.gov (United States)

    Robert Wood Johnson Foundation Search How We Work Our Focus Areas About RWJF Search Menu How We Work Grants ... Learn more For Grantees and Grantseekers The Robert Wood Johnson Foundation funds a wide array of programs ...

  8. Cognitive Foundations for Visual Analytics

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Noonan, Christine F.; Franklin, Lyndsey

    2011-02-25

    In this report, we provide an overview of scientific/technical literature on information visualization and VA. Topics discussed include an update and overview of the extensive literature search conducted for this study, the nature and purpose of the field, major research thrusts, and scientific foundations. We review methodologies for evaluating and measuring the impact of VA technologies as well as taxonomies that have been proposed for various purposes to support the VA community. A cognitive science perspective underlies each of these discussions.

  9. Antithetic Foundations of Economics

    Directory of Open Access Journals (Sweden)

    Marin Dinu

    2011-03-01

    Full Text Available This paper aims at decrypting the manner in which the foundations of Economics as a science and the meanings of the relevant explanatory formulas are being shaped. My analytical endeavor focuses on understanding the peculiarities of what is referred to as the object of study of the science known as Economics, an academic synthesis of concept-related breakthroughs regarding economicity. The explicit purpose of this analysis is to identify perennial benchmarks in economic cognition whereby this ensures its consistency. The implicit purpose is to shape a cognitive model in line with the specifics of the conceptual universe of Economics, as well as with the sources of the economic realities that are subject to a sui-generis relativism. The primary benefit of this endeavor consists in systemizing the conceptual prospects with an antithetic nature that allow for the explanations of the state of economic rationality and generate the understanding of what the source of economicity is and how it behaves. As such, the conclusions are marked by the stringent need of more precisely defining economic knowledge in order to match the changing nature of economic reality, as an expression that embraces the meeting point of two ontological vistas that are methodologically separated by some theories: human nature and human condition. Economics as a science thus features, apart from a conceptual substrate that needs to be spotted, an ontological background that needs to be revealed. The role played by this background appears to be most frequently ignored. The joint identification of both direct and contextual determinants for a sensitive area of humankind, i.e. the economy, is a direction to be followed by the royal path of rational knowledge.

  10. Towards Territorial Privacy in Smart Environments

    NARCIS (Netherlands)

    Könings, Bastian; Schaub, Florian; Weber, M.; Kargl, Frank

    Territorial privacy is an old concept for privacy of the personal space dating back to the 19th century. Despite its former relevance, territorial privacy has been neglected in recent years, while privacy research and legislation mainly focused on the issue of information privacy. However, with the

  11. Privacy Awareness: A Means to Solve the Privacy Paradox?

    Science.gov (United States)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  12. The Danish Industrial Foundations

    DEFF Research Database (Denmark)

    Thomsen, Steen

    and governed, what role it plays in the Danish economy, and how industrial foundation-owned companies perform. The book is the result of a large collaborative research project, led by the author, on industrial foundations. Some global companies such as IKEA, Robert Bosch or the Tata Group are foundation...

  13. Solar panel foundation device

    Energy Technology Data Exchange (ETDEWEB)

    Hawley, W.W.

    1983-03-29

    A transportable solar panel foundation device which has a bottom member, at least one upstanding side member, and an essentially open top. The side members are angled to permit nesting of a plurality of the foundation devices, and reinforcement pads are carried by the foundation device to support legs for one or more solar panels.

  14. Second thoughts about privacy, safety and deception

    Science.gov (United States)

    Sorell, Tom; Draper, Heather

    2017-07-01

    In this paper, we point out some difficulties with interpreting three of five principles formulated at a retreat on robot ethics sponsored by the Arts and Humanities Council and the Engineering and Physical Sciences Research Council. We also attempt to iron out some conflicts between the principles. Some of the difficulties arise from the way that the autonomy of robot users - their capacity to live by their own choices - can be a goal in the design of care robots. We discuss (a) problems for Principle 2 that arise from competing legal and philosophical understandings of privacy; (b) a tension between privacy and safety (Principles 2 and 3) and (c) some scepticism about the application of Principle 4, which addresses robot design that might result in the deception of vulnerable users.

  15. The Reflective Foundation

    DEFF Research Database (Denmark)

    Lunde Jørgensen, Ida

    Private foundations and cultural philanthropy by élites is viewed with increasing skepticism in recent years, begging the question of the extent to which foundations reflect on their role vis a vis wider societal norms. Through the prism of the New Carlsberg Foundation, financed by the brewery...... Carlsberg A/S, the paper seeks to elucidate the way in which one culturally significant foundation from Denmark has reflected on - and legitimated - its work and investments at critical moments in the past decades. The paper indicates a foundation with a high degree of reflection on the wider societal...

  16. Gaussian operations and privacy

    International Nuclear Information System (INIS)

    Navascues, Miguel; Acin, Antonio

    2005-01-01

    We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states

  17. Privacy 2.0

    Directory of Open Access Journals (Sweden)

    Stylianos Papathanassopoulos

    2015-04-01

    Full Text Available We live in the era of change. In this world, privacy is not a static concept, but instead has a dynamic component. Overall, it becomes clear that the public and private are not defined in the same manner as in the past and as in the actual world, while our personal information has become a commodity that can raise our visibility in the social media driven world.

  18. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  19. PRIVACY AS A CULTURAL PHENOMENON

    Directory of Open Access Journals (Sweden)

    Garfield Benjamin

    2017-07-01

    Full Text Available Privacy remains both contentious and ever more pertinent in contemporary society. Yet it persists as an ill-defined term, not only within specific fields but in its various uses and implications between and across technical, legal and political contexts. This article offers a new critical review of the history of privacy in terms of two dominant strands of thinking: freedom and property. These two conceptions of privacy can be seen as successive historical epochs brought together under digital technologies, yielding increasingly complex socio-technical dilemmas. By simplifying the taxonomy to its socio-cultural function, the article provides a generalisable, interdisciplinary approach to privacy. Drawing on new technologies, historical trends, sociological studies and political philosophy, the article presents a discussion of the value of privacy as a term, before proposing a defense of the term cyber security as a mode of scalable cognitive privacy that integrates the relative needs of individuals, governments and corporations.

  20. Environmental Foundations in Germany

    Directory of Open Access Journals (Sweden)

    Thomas Krikser

    2015-05-01

    Full Text Available Foundations in Germany were examined in the context of environmental issues. Data from environmental foundations show that there is huge difference between private and public foundations concerning financial settings. Furthermore, environment is often not the only objective and sometimes not even processed. Our analysis shows that there are different types of foundations with regard to environmental scopes and activities. Although “attractive topics” such as biodiversity and landscape conservation seem to be more important to foundations, less visible topics such as pollution prevention remain merely a “blind spot.” Together, these findings suggest that there is only a limited potential of private foundations compared with public foundations. Nevertheless, there might be an impact on environmental awareness and local sustainability.

  1. The privacy implications of Bluetooth

    OpenAIRE

    Kostakos, Vassilis

    2008-01-01

    A substantial amount of research, as well as media hype, has surrounded RFID technology and its privacy implications. Currently, researchers and the media focus on the privacy threats posed by RFID, while consumer groups choose to boycott products bearing RFID tags. At the same, however, a very similar technology has quietly become part of our everyday lives: Bluetooth. In this paper we highlight the fact that Bluetooth is a widespread technology that has real privacy implications. Furthermor...

  2. Cognitive Privacy for Personal Clouds

    Directory of Open Access Journals (Sweden)

    Milena Radenkovic

    2016-01-01

    Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.

  3. NEWS: Solid foundations?

    Science.gov (United States)

    2000-07-01

    Among the initiatives to be found at UK universities is a vocational award with the title `University Foundation Degree' at Nottingham Trent University. This qualification will be offered in 14 different subjects including four in the Faculty of Science and Mathematics, in the areas of applied biology, applied sciences, chemistry and physics. The courses will be available on a two-year full-time, three-year sandwich or a part-time basis. Set at a higher standard and specification than the Higher National Diplomas which it replaces, the UFD has been devised in consultation with industry and will cover the technical and specialist areas demanded by employers to combat skills shortages. The UFD in applied sciences concentrates on practical applications through laboratory, IT and project work, supported by lectures and seminars. At the end students can enter the employment market or transfer onto the second year of a degree course. Science-based careers including research and development would be the aim of those taking the UFD in physics. The first year develops the fundamentals of modern physics supported by studies in mathematics, IT and computer programming, whilst year 2 is vocational in nature with industrial problem solving and work experience as well as an academic theme associated with environmental aspects of the subject. Those who complete the UFD will be allowed automatic progression to a specified honours degree course and would normally be expected to study for a further two years for this award. However, those demonstrating an outstanding academic performance can transfer to the linked degree programme at the end of the first year via fast-track modules. Back in May the UK's Quality Assurance Agency (QAA) announced new standard benchmarks for degrees. These will be introduced into higher education institutions from 2002 to outline the knowledge, understanding and skills a student should gain from a particular higher education course. These benchmark

  4. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  5. A Survey of Privacy on Data Integration

    OpenAIRE

    Do Son, Thanh

    2015-01-01

    This survey is an integrated view of other surveys on privacy preserving for data integration. First, we review the database context and challenges and research questions. Second, we formulate the privacy problems for schema matching and data matching. Next, we introduce the elements of privacy models. Then, we summarize the existing privacy techniques and the analysis (proofs) of privacy guarantees. Finally, we describe the privacy frameworks and their applications.

  6. Technical Privacy Metrics: a Systematic Survey

    OpenAIRE

    Wagner, Isabel; Eckhoff, David

    2018-01-01

    The file attached to this record is the author's final peer reviewed version The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics challenging. As a result, instead of using existing metrics, n...

  7. Shells on elastic foundations

    International Nuclear Information System (INIS)

    Das, Y.C.; Kedia, K.K.

    1977-01-01

    No realistic analytical work in the area of Shells on Elastic Foundations has been reported in the literature. Various foundation models have been proposed by several authors. These models involve one or more than one parameters to characterise the foundation medium. Some of these models cannot be used to derive the basic equations governing the behaviour of shells on elastic foundations. In the present work, starting from an elastic continuum hypothesis, a mathematical model for foundation has been derived in curvilinear orthogonal coordinates by the help of principle of virtual displacements, treating one of the virtual displacements as known to satisfy certain given conditions at its edge surfaces. In this model, several foundation parameters can be considered and it can also be used for layered medium of both finite and infinite thickness. (Auth.)

  8. The Privacy Coach: Supporting customer privacy in the Internet of Things

    OpenAIRE

    Broenink, Gerben; Hoepman, Jaap-Henk; Hof, Christian van 't; van Kranenburg, Rob; Smits, David; Wisman, Tijmen

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator between customer privacy preferences and corporate privacy policies, trying to find a match between the ...

  9. 75 FR 54331 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-09-07

    ... Administrator of the Office of Information and Regulatory Affairs, Office of Management and Budget (OMB), on..., Academic Competitiveness Grants (ACG), National Science and Mathematics Access to Retain Talent (National... Privacy Act Advice Disclosure. The Department may disclose records to the DOJ or the Office of Management...

  10. [Foundation of the science and society alliance in France. Towards a conscious and recognised collaboration between actors of research and civil society].

    Science.gov (United States)

    Fellini, Nadia; Faroult, Elie

    2015-01-01

    In the last two decades, the debate on the meaning of science in relation to societies that create it, nourish it, and benefit from it, focused on civil society's ability to produce knowledge. This yielded first the concept of participatory science and later the wider concept of participatory research. Throughout Europe, numerous collective experimentations have generated countless interactions, and new interfaces between the world of research and civil society are constantly being created. But in spite of the proliferation of these experiences, a paradox slows down their acknowledgment and legitimation. On the one hand, these interactions often go unseen and unrecognized by the institutions, public policies, and even at times their very creators. On the other hand, scientists, are still overwhelmingly wary of civil society and, perceiving only its intellectual deficit and lack of comprehension, they fail to consider the study and development of these interactions as being of primary importance. The Sciences and Society Alliance, which was recently founded in France, provides a platform where these collaborative experiences can be collected, studied, supported, communicated, and institutionally acknowledged. The launch of this process,which is soon to be European in scope, answers the need to bring science into the democratic path tread by the societies that create it. In its ability to compose diversity, this process is an example of deep democracy.

  11. Selecting students for a South African mathematics and science foundation programme: effectiveness and fairness of school-leaving examinations and aptitude tests.

    NARCIS (Netherlands)

    van der Flier, H.; Thijs, G.D.; Zaaiman, H.

    2003-01-01

    The identification of students with the potential to succeed in mathematics- and science-based study despite previous educational disadvantage is a critical issue currently facing many South African higher education institutions. The possible use of school-leaving examination (Matric) results and/or

  12. Privacy Law and Print Photojournalism.

    Science.gov (United States)

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  13. Story Lab: Student Data Privacy

    Science.gov (United States)

    Herold, Benjamin

    2015-01-01

    Student data privacy is an increasingly high-profile--and controversial--issue that touches schools and families across the country. There are stories to tell in virtually every community. About three dozen states have passed legislation addressing student data privacy in the past two years, and eight different proposals were floating around…

  14. Privacy and Big Data

    CERN Document Server

    Craig, Terence

    2011-01-01

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today-truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Pri

  15. Speech Privacy Problems

    Science.gov (United States)

    1945-08-18

    eondwious, «ach AnvoWnc either one or tiro staple m^aSattoa processes. The British teo -dimensioaai privacy system eUiissd both ire- oasaay ana time...of the 884 gas tube and ground showed that the tubs did not re- main fired throughout the duration of the 4- kc puls.e. Instead, the tube fired on...ouri’ent through the relay circuit was not sufficient to: permit its firm operation, especially when the amplitude of the 4~ kc pulse was low. This

  16. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  17. Fair Information Principles of Brazilian Companies online privacy policies

    Directory of Open Access Journals (Sweden)

    Patricia Zeni Marchiori

    2016-05-01

    Full Text Available This research aims to present the Fair Information Principles in the privacy policies of the websites of major Brazilian companies (according to the 2014 Forbes Magazine list. The check and analysis were supported by a checklist compiled from documents issued by the Federal Trade Commission and the Organization for Economic Co-operation and development. The study selected fourteen companies from a universe of twenty-five, considering the immediacy criterion of access to the privacy policy on their websites. The security (safeguards principle is the most widespread foundation at the privacy policies of the companies selected (existing in eight of the fourteen analyzed policies; and the principle of responsibility receives less adhesion due to the fact that it is not covered in any of the examined online privacy policies. The Sabesp Company presents the most complete privacy policy, considering the compliance with the Fair Information Principles when compared to the others perused, while WEG does not present any of the principles identified in the documental survey. As for e-commerce, the number of companies that assume some of the Principles is further reduced. For the selected universe the adherence to the Fair information Principles is still incipient, althought its use is not mandatory. An open discussion of the proposed Brazilian law about personal data protection should play an important role in creating further guidance on the subject. Additional studies in this subject should involve the perception of users, as well as a cutout of companies which target e-commerce, considering that an effective alignment with these principles and other guidelines are required in order to protect the user’s privacy and personal data in the web environment.

  18. Establishing a University Foundation.

    Science.gov (United States)

    Lemish, Donald L.

    A handbook on how to establish a university foundation is presented. It presupposes that a foundation will be used as the umbrella organization for receiving all private gifts, restricted and unrestricted, for the benefit of a public college or university; and hence it chiefly addresses readers from public colleges and universities. Information is…

  19. Foundations for Critical Thinking

    Science.gov (United States)

    Bers, Trudy; Chun, Marc; Daly, William T.; Harrington, Christine; Tobolowsky, Barbara F.

    2015-01-01

    "Foundations for Critical Thinking" explores the landscape of critical-thinking skill development and pedagogy through foundational chapters and institutional case studies involving a range of students in diverse settings. By establishing a link between active learning and improved critical thinking, this resource encourages all higher…

  20. Modelling Foundations and Applications

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the 8th European Conference on Modelling Foundations and Applications, held in Kgs. Lyngby, Denmark, in July 2012. The 20 revised full foundations track papers and 10 revised full applications track papers presented were carefully reviewed...

  1. The Monopod Bucket Foundation

    DEFF Research Database (Denmark)

    Bakmar, Christian LeBlanc; Ahle, Kim; Nielsen, Søren A.

    2009-01-01

    Following the successful installation of a prototype of a monopod bucket foundation, also called a “monopod suction caisson”, at Horns Rev 2 Offshore Wind Farm, Denmark, in 2009, DONG Energy is currently developing a commercialization strategy. The monopod bucket foundation is a promising...

  2. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  3. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  4. The role of foundations: Rockefeller Foundation.

    Science.gov (United States)

    Rockefeller, David

    The consequences of climate change and the impacts of human activity on the environment have made it clearer than ever before that we must evolve our current model of public health to better account for the inextricable link between human health and the natural systems on which it depends-creating a "public health 2.0" that builds on the innovations of the twentieth century to account for a world where humans have bypassed planetary boundaries to achieve well-being. First coined at the Rockefeller Foundation's Centennial gathering in Beijing in 2013, "Planetary Health" will factor in future health and environmental harms over present-day gains, particularly those that disproportionately affect the poor and those in developing nations. To build this new field, foundations must address the challenge of information, increasing support for research to bridge knowledge gaps on the links between economic development, natural systems, and human health.

  5. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  6. Foundations of compositional model theory

    Czech Academy of Sciences Publication Activity Database

    Jiroušek, Radim

    2011-01-01

    Roč. 40, č. 6 (2011), s. 623-678 ISSN 0308-1079 R&D Projects: GA MŠk 1M0572; GA ČR GA201/09/1891; GA ČR GEICC/08/E010 Institutional research plan: CEZ:AV0Z10750506 Keywords : multidimensional probability distribution * conditional independence * graphical Markov model * composition of distributions Subject RIV: IN - Informatics, Computer Science Impact factor: 0.667, year: 2011 http://library.utia.cas.cz/separaty/2011/MTR/jirousek-foundations of compositional model theory.pdf

  7. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  8. Towards Privacy Managment of Information Systems

    OpenAIRE

    Drageide, Vidar

    2009-01-01

    This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing personal information. Following this, a strategy for evaluating the overall level of privacy in a system is defined. The strategy is then applied to parts of the cellphone system in an attempt to evaluate the privacy of traffic and location data in this system.

  9. An Alternative View of Privacy on Facebook

    OpenAIRE

    Christian Fuchs

    2011-01-01

    The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy ...

  10. Effective online privacy mechanisms with persuasive communication

    OpenAIRE

    Coopamootoo, P L

    2016-01-01

    This thesis contributes to research by taking a social psychological perspective to managing privacy online. The thesis proposes to support the effort to form a mental model that is required to evaluate a context with regards to privacy attitudes or to ease the effort by biasing activation of privacy attitudes. Privacy being a behavioural concept, the human-computer interaction design plays a major role in supporting and contributing to end users’ ability to manage their privacy online. Howev...

  11. Adding query privacy to robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2012-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity...

  12. Introductory guide to foundations

    CSIR Research Space (South Africa)

    Donaldson, GW

    1973-01-01

    Full Text Available . The secret of successful foundations is knowing just how much the subsoil can support. As one goes deeper, the ability of the ground to support a load becomes greater so that the foundation engineer can choose between deep foundations and the expense... beginstoinaease. When the house is ~ ~ p l e t e d it shelters the gmund f f ~ m sun and wind and the moisture content i- wen more rapidly- Leaking pipes and sewers increase the volume of water fed to the clay while ornamental trees planted around the house...

  13. Trajectory data privacy protection based on differential privacy mechanism

    Science.gov (United States)

    Gu, Ke; Yang, Lihao; Liu, Yongzhi; Liao, Niandong

    2018-05-01

    In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.

  14. Privacy and CHI : methodologies for studying privacy issues

    NARCIS (Netherlands)

    Patil, S.; Romero, N.A.; Karat, J.

    2006-01-01

    This workshop aims to reflect on methodologies to empirically study privacy issues related to advanced technology. The goal is to address methodological concerns by drawing upon both theoretical perspectives as well as practical experiences.

  15. Privacy protection for patients with substance use problems

    Directory of Open Access Journals (Sweden)

    Hu LL

    2011-12-01

    Full Text Available Lianne Lian Hu1, Steven Sparenborg2, Betty Tai21Department of Preventive Medicine and Biometrics, Uniformed Services University of the Health Sciences, 2Center for the Clinical Trials Network, National Institute on Drug Abuse, National Institutes of Health, Bethesda, MDAbstract: Many Americans with substance use problems will have opportunities to receive coordinated health care through the integration of primary care and specialty care for substance use disorders under the Patient Protection and Affordable Care Act of 2010. Sharing of patient health records among care providers is essential to realize the benefits of electronic health records. Health information exchange through meaningful use of electronic health records can improve health care safety, quality, and efficiency. Implementation of electronic health records and health information exchange presents great opportunities for health care integration, but also makes patient privacy potentially vulnerable. Privacy issues are paramount for patients with substance use problems. This paper discusses major differences between two federal privacy laws associated with health care for substance use disorders, identifies health care problems created by privacy policies, and describes potential solutions to these problems through technology innovation and policy improvement.Keywords: substance abuse, patient privacy, electronic health records, health information exchange

  16. When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System

    KAUST Repository

    Liu, Xiao; Liu, An; Zhang, Xiangliang; Li, Zhixu; Liu, Guanfeng; Zhao, Lei; Zhou, Xiaofang

    2017-01-01

    result. However, none is designed for both hiding users’ private data and preventing privacy inference. To achieve this goal, we propose in this paper a hybrid approach for privacy-preserving recommender systems by combining differential privacy (DP

  17. Performing privacy in schools

    DEFF Research Database (Denmark)

    Lauritsen, Peter; Bøge, Ask Risom; Andersen, Lars Bo

    with technologies is carried out as well as observation is conducted. We obtain and present new knowledge about how surveillance is practiced in the interpersonal relations of students and teachers. References: Monahan, T., & Torres, R. D. (2009). Schools Under Surveillance: Cultures of Control in Public Education....... Rutgers University Press. Selwyn, N. (2010). Schools and Schooling in the Digital Age: A Critical Analysis. Routledge. Taylor, E. (2013). Surveillance Schools: Security, Discipline and Control in Contemporary Education. Palgrave Macmillan UK. Taylor, E., & Rooney, T. (2016). Surveillance Futures: Social......In this presentation we pursue the question: How is privacy performed and perceived in schools by children? Our aim is to investigate how the boundaries between public and private spheres are continuously performed in the formal setting of the classroom as well as in the social lives of students...

  18. Parasiteware: Unlocking Personal Privacy

    Directory of Open Access Journals (Sweden)

    Daniel B. Garrie

    2006-09-01

    Full Text Available Spyware presents a threat of privacy infringement to unassuming internet users irrespective of their country of citizenship. European legislation attempts to protect end-users from unethical processing of their personal data. Spyware technologies, however, skirts these laws and often break them in their entirety. Outlawing the spyware and strengthening the legal consent requirement to mine data are statutory solutions that can prevent spyware users from skirting the law. An internationally standardized technology education system for the judiciaries in Europe and the U.S. can help ensure that when spyware users do break the law, they cannot hide by escaping from one nation to another without being held accountable. Transnational improvements are necessary to remedy the global spyware epidemic.

  19. Contexto do ensino de fundamentos teóricos de biblioteconomia na UFSCThe teaching of theoretical foundations of library science in the UFSC

    Directory of Open Access Journals (Sweden)

    Francisco das Chagas de Souza

    2001-12-01

    Full Text Available It presents a didactic-pedagogical proposal in development in the Library Science undergraduated course of the FederalUniversity of Santa Catarina, Brazil, realized in form of seminaries in the discipline "Special Topics in Librarianship.Apresenta proposta didático-pedagógica - e seus fundamentos - em desenvolvimento no Currículo do Curso de Biblioteconomia da Universidade Federal de Santa Catarina, cuja execução se dá através da realização de seminários na disciplina Tópicos Especiais em Biblioteconomia a qual faz parte do núcleo disciplinar de Fundamentos Teóricos de Biblioteconomia.

  20. ACHIEVEMENTS OF PEDIATRIC ANDROLOGY/GYNECOLOGY AS THE FOUNDATION FOR PREVENTION OF REPRODUCTIVE AND SEXUAL FAILURE OF ADULT PATIENTS. THE SCIENCE ABOUT HUMAN SEX

    Directory of Open Access Journals (Sweden)

    A. B. Okulov

    2015-01-01

    Full Text Available Authors summarize the experience of management of children with different disorders of reproductive system and emphasize typical mistakes of practitioners, leading in future to decreased human fertility and to deterioration of demographical problems in Russia. Necessity of pediatric andrology/gynecology development as special area of medicine is proved and problems of its establishment are discussed. Authors bring up debatable issue about age qualification for choice of sex in patients born with malformations of externalia. Borderlines and content of new research area – science about human sex – are determined with emphasizing of its interdisciplinary character and problems of professional education which is in prevalence individual. Necessity of terminological unification in pediatric andrology/gynecology is emphasized because inaccurate terms lead to erroneous decisions and actions with long-term sequels. 

  1. From Theory to Practice: Utilizing Competency-based Milestones to Assess Professional Growth and Development in the Foundational Science Blocks of a Pre-Clerkship Medical School Curriculum.

    Science.gov (United States)

    Pettepher, Cathleen C; Lomis, Kimberly D; Osheroff, Neil

    2016-09-01

    Physicians-in-training require skills and attitudes beyond medical knowledge in order to mature into successful clinicians. However, because assessments in pre-clerkship curricula historically have focused almost exclusively on medical knowledge, faculty contributions to early student development often have been limited. To address this challenge and enhance student progress, we re-designed our pre-clerkship curriculum to include settings in which diverse facets of student performance could be observed and fostered. Concurrently, we transitioned to an assessment strategy focused on competency-based milestones. The implementation of this strategy has allowed pre-clerkship science faculty to provide early-stage students with rich holistic feedback designed to stimulate their professional growth.

  2. The science of sex and gender in human health: online courses to create a foundation for sex and gender accountability in biomedical research and treatment.

    Science.gov (United States)

    Plank-Bazinet, Jennifer L; Sampson, Annie; Miller, Leah R; Fadiran, Emmanuel O; Kallgren, Deborah; Agarwal, Rajeev K; Barfield, Whitney; Brooks, Claudette E; Begg, Lisa; Mistretta, Amy C; Scott, Pamela E; Clayton, Janine Austin; Cornelison, Terri L

    2016-01-01

    Sex and gender differences play a significant role in the course and outcome of conditions that affect specific organ systems in the human body. Research on differences in the effects of medical intervention has helped scientists develop a number of sex- and gender-specific guidelines on the treatment and management of these conditions. An online series of courses, "The Science of Sex and Gender in Human Health," developed by the National Institutes of Health Office of Research on Women's Health and the U.S. Food and Drug Administration Office of Women's Health, examines sex and gender differences and their implications. Thus far, three online courses have been generated. The first course offers an overview of the scientific and biological basis for sex- and gender-related differences. The second course is focused on disease-specific sex and gender differences in health and behavior and their implications. Finally, the third course covers the influence of sex and gender on disease manifestation, treatment, and outcome. Data were obtained using website analytics and post-course surveys. To date, over 1000 individuals have completed at least one course. Additionally, 600 users have received continuing education credit for completing a course in the series. Finally, the majority of respondents to the online course survey have indicated that the courses considerably enhanced their professional effectiveness. "The Science of Sex and Gender in Human Health" online courses are freely available sources of information that provide healthcare providers and researchers with the resources to successfully account for sex and gender in their medical practice and research programs.

  3. Pulmonary Fibrosis Foundation

    Science.gov (United States)

    ... submissions. MORE We Imagine a World Without Pulmonary Fibrosis The Pulmonary Fibrosis Foundation mobilizes people and resources to provide ... its battle against the deadly lung disease, pulmonary fibrosis (PF). PULMONARY FIBROSIS WALK SURPASSES PARTICIPATION AND FUNDRAISING GOALS Nearly ...

  4. Women's Heart Foundation

    Science.gov (United States)

    ... News Email: Click for e-News archive The Women's Heart Foundation is a 501c3 dedicated to prevention, ... Care Initiative® to achieve excellence of care of women. Executive nurses, civic leaders, women survivors and sponsors ...

  5. Pediatric Brain Tumor Foundation

    Science.gov (United States)

    ... navigate their brain tumor diagnosis. WATCH AND SHARE Brain tumors and their treatment can be deadly so ... Pediatric Central Nervous System Cancers Read more >> Pediatric Brain Tumor Foundation 302 Ridgefield Court, Asheville, NC 28806 ...

  6. Children's Brain Tumor Foundation

    Science.gov (United States)

    ... 2 Family Donate Volunteer Justin's Hope Fund Children’s Brain Tumor Foundation, A non-profit organization, was founded ... and the long term outlook for children with brain and spinal cord tumors through research, support, education, ...

  7. The foundations of statistics

    CERN Document Server

    Savage, Leonard J

    1972-01-01

    Classic analysis of the foundations of statistics and development of personal probability, one of the greatest controversies in modern statistical thought. Revised edition. Calculus, probability, statistics, and Boolean algebra are recommended.

  8. National Psoriasis Foundation

    Science.gov (United States)

    ... 723-9166 | Submit a Question | Learn More National Psoriasis Foundation provides you with the help you need to best manage your psoriasis or psoriatic arthritis, while promoting research to find ...

  9. Hepatitis B Foundation

    Science.gov (United States)

    ... worldwide 2 Billion People have been infected with Hepatitis B Worldwide The Hepatitis B Foundation is working ... of people living with hepatitis B. Learn About Hepatitis B in 11 Other Languages . Resource Video See ...

  10. Multiple Myeloma Research Foundation

    Science.gov (United States)

    ... MMRF Founder Kathy Giusti named 1 of 100 Visionaries of our time by the Einstein Foundation Learn More September 8, 2017 Tom Brokaw gives inspiring speech at MMRF Leadership Circle Summit on how his life was changed, ...

  11. American Lyme Disease Foundation

    Science.gov (United States)

    ... Infectious Diseases, 35: 451-464, 2002) What is Lyme Disease? Lyme disease (LD) is an infection caused by ... mission with your own tax-deductible contribution. American Lyme Disease Foundation, Inc. PO Box 466 Lyme, CT 06371 ...

  12. American Vitiligo Research Foundation

    Science.gov (United States)

    ... Place Vitiligo Voices Contact Welcome to The American Vitiligo Foundation Home Page Top Isabella T., California An ... 20.00 USD 20 for - 35.00 USD Vitiligo Doesn't Scare Me by Kim Kirkland Kim ...

  13. Moebius Syndrome Foundation

    Science.gov (United States)

    ... craniofacial/neurological disorder. Individuals with Moebius syndrome cannot smile or frown, and do not have lateral eye ... the organization to ensure that they are in line with the mission of the Moebius Syndrome Foundation. ...

  14. National Headache Foundation

    Science.gov (United States)

    ... Headache Topic Sheets (Spanish) Headache FAQ NHF Webinars Education Modules MigrainePro™ Children’s Headache Disorders New Perspectives on Caffeine and Headache War Veterans Health Resource Initiative National Headache Foundation Brochures ...

  15. Intracranial Hypertension Research Foundation

    Science.gov (United States)

    ... PARTNERSHIPS Meet our Fundraising Partners Tweet Welcome Intracranial hypertension (IH) is the general term for the neurological ... high. (Old names for IH include Benign Intracranial Hypertension and Pseudotumor Cerebri). The Intracranial Hypertension Research Foundation ...

  16. Oral Cancer Foundation

    Science.gov (United States)

    ... Get involved Understanding Dental Research People Resources About Understanding Events Get involved Dental Research Resources Contact Sitemap The Oral Cancer Foundation admin 2017-11-12T16:49:25+ ...

  17. Foundations of laser spectroscopy

    CERN Document Server

    Stenholm, Stig

    2005-01-01

    A simple presentation of the theoretical foundations of steady-state laser spectroscopy, this text helps students to apply theory to calculations with a systematic series of examples and exercises. 1984 edition.

  18. International OCD Foundation

    Science.gov (United States)

    ... and productive lives. Join Donate Volunteer Events International OCD Foundation Research. Resources. Respect. About OCD About IOCDF ... Donate Here Why Should You Attend the Annual OCD Conference? Watch the Video Find Help Search the ...

  19. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  20. Foundations of Neuromorphic Computing

    Science.gov (United States)

    2013-05-01

    paradigms: few sensors/complex computations and many sensors/simple computation. Challenges with Nano-enabled Neuromorphic Chips A wide variety of...FOUNDATIONS OF NEUROMORPHIC COMPUTING MAY 2013 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION...2009 – SEP 2012 4. TITLE AND SUBTITLE FOUNDATIONS OF NEUROMORPHIC COMPUTING 5a. CONTRACT NUMBER IN-HOUSE 5b. GRANT NUMBER N/A 5c. PROGRAM

  1. Foundations of measurement

    CERN Document Server

    Suppes, Patrick

    1989-01-01

    Foundations of Measurement offers the most coherently organized treatment of the topics and issues central to measurement. Much of the research involved has been scattered over several decades and a multitude of journals--available in many instances only to specialties. With the publication of Volumes two and three of this important work, Foundations of Measurement is the most comprehensive presentation in the area of measurement.

  2. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  3. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang; Papadimitriou, Panagiotis D.; Raï ssi, Chedy; Kalnis, Panos; Pung, Hungkeng

    2011-01-01

    an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data

  4. Privacy and the Connected Society

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    The Vision of the 5G enabled connected society is highly based on the evolution and implementation of Internet of Things. This involves, amongst others, a significant raise in devices, sensors and communication in pervasive interconnections as well as cooperation amongst devices and entities across...... the society. Enabling the vision of the connected society, researchers point in the direction of security and privacy as areas to challenge the vision. By use of the Internet of Things reference model as well as the vision of the connected society, this paper identifies privacy of the individual with respect...... to three selected areas: Shopping, connected cars and online gaming. The paper concludes that privacy is a complexity within the connected society vision and that thee is a need for more privacy use cases to shed light on the challenge....

  5. Librarians, Civil Liberties and Privacy.

    Science.gov (United States)

    Fielding, Derek

    1978-01-01

    A comparison of current civil liberties issues in Australia with the status of similar issues in Britain and the United States. Included are political affiliation of government employees, censorship, rights of the individual, privacy, and freedom of information. (JAB)

  6. Privacy Impact Assessment (PIA) Repository

    Data.gov (United States)

    Department of Veterans Affairs — This repository contains Privacy Impact Assessments (PIA) that have been vetted/approved. Section 208 of the Electronic Government Act of 2002 (E-Gov Act) requires...

  7. Privacy-preserving Identity Management

    OpenAIRE

    Milutinovic, Milica

    2015-01-01

    With the technological advances and the evolution of online services, user privacy is becoming a crucial issue in the modern day society. Privacy in the general sense refers to individuals’ ability to protect information about themselves and selectively present it to other entities. This concept is nowadays strongly affected by everyday practices that assume personal data disclosure, such as online shopping and participation in loyalty schemes. This makes it difficult for an individual to con...

  8. PRIVACY CONCERNS IN FACEBOOK SITE

    OpenAIRE

    Vandana Singh

    2014-01-01

    Today social networking sites play an important role and inexpensive way to maintain existing relationships and present oneself. However, the increasing use of online sites give rise to privacy concerns and risks. All Internet sites are also under attack from phishers, fraudsters, and spammers. They aim to steal user information and expose users to unwanted spam. They have so many resources at their disposal.This paper studies the awareness of college students regarding the privacy in Faceboo...

  9. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  10. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  11. Privacy concerns in smart cities

    OpenAIRE

    van Zoonen, Liesbet

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in research about people's concerns about privacy: one dimensions represents that people perceive particular data as more personal and sensitive than others, the other dimension represents that people'...

  12. The concept and science process skills analysis in bomb calorimeter experiment as a foundation for the development of virtual laboratory of bomb calorimeter

    Science.gov (United States)

    Kurniati, D. R.; Rohman, I.

    2018-05-01

    This study aims to analyze the concepts and science process skills in bomb calorimeter experiment as a basis for developing the virtual laboratory of bomb calorimeter. This study employed research and development method (R&D) to gain the answer to the proposed problems. This paper discussed the concepts and process skills analysis. The essential concepts and process skills associated with bomb calorimeter are analyze by optimizing the bomb calorimeter experiment. The concepts analysis found seven fundamental concepts to be concerned in developing the virtual laboratory that are internal energy, burning heat, perfect combustion, incomplete combustion, calorimeter constant, bomb calorimeter, and Black principle. Since the concept of bomb calorimeter, perfect and incomplete combustion created to figure out the real situation and contain controllable variables, in virtual the concepts displayed in the form of simulation. Meanwhile, the last four concepts presented in the form of animation because no variable found to be controlled. The process skills analysis detect four notable skills to be developed that are ability to observe, design experiment, interpretation, and communication skills.

  13. Teaching health science students foundation motivational interviewing skills: use of motivational interviewing treatment integrity and self-reflection to approach transformative learning.

    Science.gov (United States)

    M, Schoo A; S, Lawn; E, Rudnik; C, Litt J

    2015-12-21

    Many undergraduate and graduate-entry health science curricula have incorporated training in motivational interviewing (MI). However, to effectively teach skills that will remain with students after they graduate is challenging. The aims of this study were to find out self-assessed MI skills of health students and whether reflecting on the results can promote transformative learning. Thirty-six Australian occupational therapy and physiotherapy students were taught the principles of MI, asked to conduct a motivational interview, transcribe it, self-rate it using the Motivational Interviewing Treatment Integrity (MITI) tool and reflect on the experience. Student MI skills were measured using the reported MITI subscores. Student assignments and a focus group discussion were analysed to explore the student experience using the MITI tool and self-reflection to improve their understanding of MI principles. Students found MI challenging, although identified the MITI tool as useful for promoting self-reflection and to isolate MI skills. Students self-assessed their MI skills as competent and higher than scores expected from beginners. The results inform educational programs on how MI skills can be developed for health professional students and can result in transformative learning. Students may over-state their MI skills and strategies to reduce this, including peer review, are discussed. Structured self-reflection, using tools such as the MITI can promote awareness of MI skills and compliment didactic teaching methods.

  14. Fundamentos do 'Paradigma Metodológico Causal' nas ciências sociais Foundations of the "Causal Methodological Paradigm" in social sciences

    Directory of Open Access Journals (Sweden)

    Juan Mario Fandiño Marino

    2012-12-01

    reflects on the underlying logic of the so-called 'quantitative methods' applied to social sciences. The account of such underlying logic is framed within the efforts towards establishing the existence of a single comprehensive logic for both the most typical approaches to social sciences methodology, namely the qualitative and the quantitative. This single logic is pursued by means of Kuhn's concept of "scientific paradigm" (1975, where methodological issues represent, while 'work assumption', a particular instance of scientific paradigm, distinguished from other paradigms by the absence of symbolic generalizations, anomalies and 'revolutions', and by the substantive role of procedural models, primarily regarding evidence provision. For this purpose, the paper presents a concise review of Kuhninan paradigms and, then, analyzes the so called quantitative methodological tradition in social sciences - particularly in sociology - in the light of such paradigms, and coining the term 'causal methodological paradigm' (CMP. Therefore, by means of the paradigmatic framing of these two approaches (though that of qualitative method is postponed to a future step in this research line, it will be possible to establish whether the interface between the two approaches meet the assumption of an underlying methodological common logic. In the affirmative case, the competing perspectives on issues of choice and composition between the two practices would be reduced - and even eliminated - thus contributing to the consolidation of mixed methods, qualitative-quantitative, strategies. Finally, it is worth noting that CMP's underlying logic implies the combination of the concept of cause, in its broad sense, with the experimental model and its developments It does not mean, however, to assume that the instrumental role of qualitative methods in the own CMP relies on either the notion of cause, or experiment or whatever comparisons.

  15. Annual report Foundation Flora Malesiana 1992

    NARCIS (Netherlands)

    Roos, M.C.

    1993-01-01

    Second Flora Malesiana Symposium — The highlight of the year was the Second Flora Malesiana Symposium. It was organized under the auspices of the Foundation Flora Malesiana (FFM) by Puslitbang Biologi of the Indonesian Institute of Sciences (LIPI) and the Fakultas Biologi of the Gadjah Mada

  16. 78 FR 37590 - Advisory Committee for Mathematical and Physical Sciences #66; Notice of Meeting

    Science.gov (United States)

    2013-06-21

    ... Science Foundation and to provide advice and recommendations concerning research in mathematics and... NATIONAL SCIENCE FOUNDATION Advisory Committee for Mathematical and Physical Sciences 66; Notice... National Science Foundation announces the following meeting. Name: Advisory Committee for Mathematical and...

  17. 45 CFR 660.3 - What programs and activities of the Foundation are subject to these regulations?

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false What programs and activities of the Foundation are... (Continued) NATIONAL SCIENCE FOUNDATION INTERGOVERNMENTAL REVIEW OF THE NATIONAL SCIENCE FOUNDATION PROGRAMS AND ACTIVITIES § 660.3 What programs and activities of the Foundation are subject to these regulations...

  18. System Anthropological Psychology: Methodological Foundations

    Directory of Open Access Journals (Sweden)

    Vitaliy Y. Klochko

    2012-01-01

    Full Text Available The article considers methodological foundations of the system anthropologicalpsychology (SAP as a scientific branch developed by a well-represented groupof Siberian scientists. SAP is a theory based on axiomatics of cultural-historicalpsychology of L.S. Vygotsky and transspective analysis as a specially developedmeans to define the tendencies of science developing as a self-organizing system.Transspective analysis has revealed regularities in a constantly growing complexityof professional-psychological thinking along the course of emergence ofscientific cognition. It has proved that the field of modern psychology is shapedby theories constructed with ideation of different grades of complexity. The concept“dynamics of the paradigm of science” is introduced; it allows transitions tobe acknowledged from ordinary-binary logic characteristics of the classical scienceto a binary-ternary logic, adequate to non-classical science and then to aternary-multidimensional logic, which is now at the stage of emergence. The latteris employed in SAP construction. It involves the following basic methodologicalprinciples: the principle of directed (selective interaction and the principle ofgenerative effect of selective interaction. The concept of “complimentary interaction”applied in natural as well as humanitarian sciences is reconsidered in thecontext of psychology. The conclusion is made that the principle of selectivity anddirectedness of interaction is relevant to the whole Universe embracing all kindsof systems including the living ones. Different levels of matter organization representingsemantic structures of various complexity use one and the same principleof meaning making through which the Universe ensures its sustainability asa self-developing phenomenon. This methodology provides an explanation fornature and stages of emergence of multidimensional life space of an individual,which comes as a foundation for generation of such features of

  19. Foundations of mechanics

    International Nuclear Information System (INIS)

    Zorski, Henryk; Bazanski, Stanislaw; Gutowski, Roman; Slawianowski, Jan; Wilmanski, Krysztof; Wozniak, Czeslaw

    1992-01-01

    In the last 3 decades the field of mechanics has seen spectacular progress due to the demand for applications in problems of cosmology, thermonuclear fusion, metallurgy, etc. This book provides a broad and thorough overview on the foundations of mechanics. It discusses theoretical mechanics and continuum mechanics, as well as phenomenological thermodynamics, quantum mechanics and relativistic mechanics. Each chapter presents the basic physical facts of interest without going into details and derivations and without using advanced mathematical formalism. The first part constitutes a classical exposition of Lagrange's and Hamiltonian's analytical mechanics on which most of the continuum theory is based. The section on continuum mechanics focuses mainly on the axiomatic foundations, with many pointers for further research in this area. Special attention is given to modern continuum thermodynamics, both for the foundations and applications. A section on quantum mechanics is also included, since the phenomenological description of various quantum phenomena is becoming of increasing importance. refs.; figs.; tabs

  20. Foundations of Risk Analysis

    CERN Document Server

    Aven, Terje

    2012-01-01

    Foundations of Risk Analysis presents the issues core to risk analysis - understanding what risk means, expressing risk, building risk models, addressing uncertainty, and applying probability models to real problems. The author provides the readers with the knowledge and basic thinking they require to successfully manage risk and uncertainty to support decision making. This updated edition reflects recent developments on risk and uncertainty concepts, representations and treatment. New material in Foundations of Risk Analysis includes:An up to date presentation of how to understand, define and

  1. Foundations of stochastic analysis

    CERN Document Server

    Rao, M M; Lukacs, E

    1981-01-01

    Foundations of Stochastic Analysis deals with the foundations of the theory of Kolmogorov and Bochner and its impact on the growth of stochastic analysis. Topics covered range from conditional expectations and probabilities to projective and direct limits, as well as martingales and likelihood ratios. Abstract martingales and their applications are also discussed. Comprised of five chapters, this volume begins with an overview of the basic Kolmogorov-Bochner theorem, followed by a discussion on conditional expectations and probabilities containing several characterizations of operators and mea

  2. Foundations of predictive analytics

    CERN Document Server

    Wu, James

    2012-01-01

    Drawing on the authors' two decades of experience in applied modeling and data mining, Foundations of Predictive Analytics presents the fundamental background required for analyzing data and building models for many practical applications, such as consumer behavior modeling, risk and marketing analytics, and other areas. It also discusses a variety of practical topics that are frequently missing from similar texts. The book begins with the statistical and linear algebra/matrix foundation of modeling methods, from distributions to cumulant and copula functions to Cornish--Fisher expansion and o

  3. Rare disease research: Breaking the privacy barrier

    Directory of Open Access Journals (Sweden)

    Deborah Mascalzoni

    2014-06-01

    Full Text Available Due to the few patients affected, rare disease research has to count on international registries to exist in order to produce significant research outputs. Data sharing of registries is therefore a unique resource to allow rare disease research to flourish and any lost data will jeopardize the quality of an already extremely difficult research. The rules usually applied to research such as the right to withdraw or the need for specific consent for every use of data can be detrimental in order to get effective results. Privacy rights regulated through traditional informed consent mechanisms have been regarded as a major barrier in order to effectively share data worldwide. Some authors argue that this barrier hampers results that could be beneficial to the patients so that another right will be overstated: the right to quality healthcare. We argue in this paper that privacy has been often interpreted just one-sided as the right to secrecy but it can entail another meaning: the right to manage one's own private sphere. Managing it pertains, not only to the right to deny access, but also to the right to grant access. At the same time research on patient participation and transparency shows that new forms of IT-based informed consent can provide a good balance between the right of individuals to be in control of their data and the opportunity for science to pursue international research.

  4. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  5. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... DEPARTMENT OF AGRICULTURE Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records... two Privacy Act Systems of Records entitled ``Information on Persons Disqualified from the...

  6. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-11-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-109)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  7. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-093)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  8. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-091)] Privacy Act of 1974; Privacy Act...: Revisions of NASA Appendices to Privacy Act System of Records. SUMMARY: Notice is hereby given that NASA is... Privacy Act of 1974. This notice publishes those amendments as set forth below under the caption...

  9. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-07-05

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-071] Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Each Federal agency is required by the Privacy Act of 1974 to publish...

  10. 78 FR 77503 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-12-23

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-149] Privacy Act of 1974; Privacy Act... proposed revisions to existing Privacy Act systems of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  11. 77 FR 69898 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2012-11-21

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 12-100] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  12. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...

  13. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  14. CARAVAN: Providing Location Privacy for VANET

    National Research Council Canada - National Science Library

    Sampigethaya, Krishna; Huang, Leping; Li, Mingyan; Poovendran, Radha; Matsuura, Kanta; Sezaki, Kaoru

    2005-01-01

    .... This type of tracking leads to threats on the location privacy of the vehicle's user. In this paper, we study the problem of providing location privacy in VANET by allowing vehicles to prevent tracking of their broadcast communications...

  15. Academic Research Equipment in the Physical and Computer Sciences and Engineering. An Analysis of Findings from Phase I of the National Science Foundation's National Survey of Academic Research Instruments and Instrumentation Needs.

    Science.gov (United States)

    Burgdorf, Kenneth; White, Kristine

    This report presents information from phase I of a survey designed to develop quantitative indicators of the current national stock, cost/investment, condition, obsolescence, utilization, and need for major research instruments in academic settings. Data for phase I (which focused on the physical and computer sciences and engineering) were…

  16. Impedance of Bucket Foundations

    DEFF Research Database (Denmark)

    Andersen, Lars; Ibsen, Lars Bo; Liingaard, Morten

    2008-01-01

    Modern offshore wind turbines are flexible structures with natural frequencies near the excitation frequencies related to wave and wind-induced loads. In order to obtain a reliable prediction of the structural response, the dynamic stiffness of the foundation must be evaluated accurately. This pa...

  17. Foundations of factor analysis

    CERN Document Server

    Mulaik, Stanley A

    2009-01-01

    Introduction Factor Analysis and Structural Theories Brief History of Factor Analysis as a Linear Model Example of Factor AnalysisMathematical Foundations for Factor Analysis Introduction Scalar AlgebraVectorsMatrix AlgebraDeterminants Treatment of Variables as Vectors Maxima and Minima of FunctionsComposite Variables and Linear Transformations Introduction Composite Variables Unweighted Composite VariablesDifferentially Weighted Composites Matrix EquationsMulti

  18. Buckling of Bucket Foundations

    DEFF Research Database (Denmark)

    Madsen, Søren; Andersen, Lars Vabbersgaard; Ibsen, Lars Bo

    2012-01-01

    In this paper, the risk of structural buckling during installation of large-diameter bucket foundations is addressed using numerical methods. Imperfect geometries are introduced based on the pre-buckling mode shapes from a linear Eigenvalue buckling analysis. Various imperfect geometries are intr...

  19. American Porphyria Foundation

    Science.gov (United States)

    ... Nicole Castelano Gregary Edwards Megan Parrish ~ How the dog I didn't want became the dog I'd always dreamed of Darnisha Davenport Liz ... or through the site for commercial or public purposes. The American Porphyria Foundation (APF) Tax Forms 990 ...

  20. Foundations of powder metallurgy

    International Nuclear Information System (INIS)

    Libenson, G.A.

    1987-01-01

    Consideration is being given to physicochemical foundations and technology of metal powders, moulding and sintering of bars, made of them or their mixtures with nonmetal powders. Data on he design of basic equipment used in the processes of powder metallurgy and its servicing are presented. General requirements of safety engineering when fabricating metal powders and products of them are mentioned

  1. Grouting for Pile Foundation Improvement

    NARCIS (Netherlands)

    Van der Stoel, A.E.C.

    2001-01-01

    The aim of this research was to examine the use of grouting methods for pile foundation improvement, a generic term that is used here to define both foundation renovation (increasing the bearing capacity of a pile foundation that has insufficient bearing capacity) and foundation protection

  2. News Focus: NSF Director Erich Bloch Discusses Foundation's Problems, Outlook.

    Science.gov (United States)

    Chemical and Engineering News, 1987

    1987-01-01

    Relates the comments offered in an interview with Erich Bloch, the National Science Foundation (NSF) Director. Discusses issues related to NSF and its funding, engineering research centers, involvement with industry, concern for science education, computer centers, and its affiliation with the social sciences. (ML)

  3. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  4. American Foundation for AIDS Research

    Science.gov (United States)

    ... WHO Support Pilot Study Investigating PrEP in the Philippines Other News and Features Breaking Her Silence We ... cost to you! About amfAR About HIV/AIDS Financial Information Donor Privacy Policy Terms of Use Sitemap ...

  5. SIED, a Data Privacy Engineering Framework

    OpenAIRE

    Mivule, Kato

    2013-01-01

    While a number of data privacy techniques have been proposed in the recent years, a few frameworks have been suggested for the implementation of the data privacy process. Most of the proposed approaches are tailored towards implementing a specific data privacy algorithm but not the overall data privacy engineering and design process. Therefore, as a contribution, this study proposes SIED (Specification, Implementation, Evaluation, and Dissemination), a conceptual framework that takes a holist...

  6. PriBots: Conversational Privacy with Chatbots

    OpenAIRE

    Harkous, Hamza; Fawaz, Kassem; Shin, Kang G.; Aberer, Karl

    2016-01-01

    Traditional mechanisms for delivering notice and enabling choice have so far failed to protect users’ privacy. Users are continuously frustrated by complex privacy policies, unreachable privacy settings, and a multitude of emerging standards. The miniaturization trend of smart devices and the emergence of the Internet of Things (IoTs) will exacerbate this problem further. In this paper, we propose Conversational Privacy Bots (PriBots) as a new way of delivering notice and choice through a two...

  7. 39 CFR 262.5 - Systems (Privacy).

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  8. Logical foundation of quantum mechanics

    International Nuclear Information System (INIS)

    Stachow, E.W.

    1980-01-01

    The subject of this article is the reconstruction of quantum mechanics on the basis of a formal language of quantum mechanical propositions. During recent years, research in the foundations of the language of science has given rise to a dialogic semantics that is adequate in the case of a formal language for quantum physics. The system of sequential logic which is comprised by the language is more general than classical logic; it includes the classical system as a special case. Although the system of sequential logic can be founded without reference to the empirical content of quantum physical propositions, it establishes an essential part of the structure of the mathematical formalism used in quantum mechanics. It is the purpose of this paper to demonstrate the connection between the formal language of quantum physics and its representation by mathematical structures in a self-contained way. (author)

  9. A PLATFORM FOR CONTEXTUAL MOBILE PRIVACY

    Science.gov (United States)

    2017-12-01

    used). As a result, a more intelligent method is needed to de- termine when a given permission request is likely to be deemed appropriate by the...tionality, we must develop an environment where permissions appear—to the application—to be allowed, but in reality only spurious or artificial data is...Term Cybersecurity (CLTC) at UC Berkeley, the Na- tional Science Foundation under grant CNS-1318680, and Intel through the ISTC for Secure Computing

  10. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...... data is anonymized in the system using data cloaking and data swapping techniques. Finally, the paper empirically demonstrates that the proposed system is effective and feasible....

  11. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    with any other entity, including the service provider. Such privacy concerns lead to trust issues between entities, which clearly damages the functioning of the service and even blocks cooperation between entities with similar data sets. To enable joint efforts with private data, we propose a protocol......, or in some cases, information from different databases is pooled to enrich the data so that the merged database can improve the clustering effort. However, in either case, the content of the database may be privacy sensitive and/or commercially valuable such that the owners may not want to share their data...... provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner....

  12. Privacy in the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Etter, Michael; Lutz, Christoph

    ’s digital services through providing recommendations to Europe’s institutions. The initial stage of this research project involves a set of three literature reviews of the state of research on three core topics in relation to the sharing economy: participation (1), privacy (2), and power (3). This piece...... is a literature review on the topic of privacy. It addresses key privacy challenges for different stakeholders in the sharing economy. Throughout, we use the term "consumers" to refer to users on the receiving end (e.g., Airbnb guests, Uber passengers), "providers" to refer to users on the providing end (e.......g., Airbnb hosts, Uber drivers) and "platforms" to refer to the mediating sites, apps and infrastructures matching consumers and providers (e.g., Airbnb, Uber)....

  13. Context-Aware Generative Adversarial Privacy

    Directory of Open Access Journals (Sweden)

    Chong Huang

    2017-12-01

    Full Text Available Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP. GAP leverages recent advancements in generative adversarial networks (GANs to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals’ private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP’s performance, we investigate two simple (yet canonical statistical dataset models: (a the binary data model; and (b the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  14. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  15. 31 CFR 0.216 - Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act of...

  16. 24 CFR 3280.107 - Interior privacy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  17. Context-Aware Generative Adversarial Privacy

    Science.gov (United States)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  18. 49 CFR 10.13 - Privacy Officer.

    Science.gov (United States)

    2010-10-01

    ... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13...

  19. Enhancing Privacy for Digital Rights Management

    NARCIS (Netherlands)

    Petkovic, M.; Conrado, C.; Schrijen, G.J.; Jonker, Willem

    2007-01-01

    This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM

  20. Access to Information and Privacy | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As a Crown corporation, IDRC is subject to Canada's laws on access to information and privacy protection. The following resources will help you learn more about IDRC and the access to information and privacy acts, including instructions for submitting an access to information or privacy act (ATIP) request. IDRC and ATIP ...

  1. Privacy protected text analysis in DataSHIELD

    Directory of Open Access Journals (Sweden)

    Rebecca Wilson

    2017-04-01

    Whilst it is possible to analyse free text within a DataSHIELD infrastructure, the challenge is creating generalised and resilient anti-disclosure methods for free text analysis. There are a range of biomedical and health sciences applications for DataSHIELD methods of privacy protected analysis of free text including analysis of electronic health records and analysis of qualitative data e.g. from social media.

  2. Smartdata privacy meets evolutionary robotics

    CERN Document Server

    Harvey, Inman; Tomko, George

    2013-01-01

    Privacy by Design and the Promise of SmartData.- SmartData: the Need, the Goal and the Challenge.- Perspectives on Artificial Intelligence.- Context dependent information processing entails scale-free dynamics.- Philosophy and SmartData.- Relevance Realization and the Neurodynamics and Neural Connectivity of General Intelligence.- What Matters: Real Bodies and Virtual Worlds.- The development of autonomous virtual agents.- Patterns of Attractors in the "Brain"".- A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services.- Unconstraint the Population: the Benefits of Horiz

  3. Preserving Employee Privacy in Wellness.

    Science.gov (United States)

    Terry, Paul E

    2017-07-01

    The proposed "Preserving Employee Wellness Programs Act" states that the collection of information about the manifested disease or disorder of a family member shall not be considered an unlawful acquisition of genetic information. The bill recognizes employee privacy protections that are already in place and includes specific language relating to nondiscrimination based on illness. Why did legislation expressly intending to "preserve wellness programs" generate such antipathy about wellness among journalists? This article argues that those who are committed to preserving employee wellness must be equally committed to preserving employee privacy. Related to this, we should better parse between discussions and rules about commonplace health screenings versus much less common genetic testing.

  4. Location Privacy with Randomness Consistency

    Directory of Open Access Journals (Sweden)

    Wu Hao

    2016-10-01

    Full Text Available Location-Based Social Network (LBSN applications that support geo-location-based posting and queries to provide location-relevant information to mobile users are increasingly popular, but pose a location-privacy risk to posts. We investigated existing LBSNs and location privacy mechanisms, and found a powerful potential attack that can accurately locate users with relatively few queries, even when location data is well secured and location noise is applied. Our technique defeats previously proposed solutions including fake-location detection and query rate limits.

  5. Mathematical logic foundations for information science

    CERN Document Server

    Li, Wei

    2010-01-01

    This book presents the basic principles and formal calculus of mathematical logic. It covers core contents, extensions and developments of classical mathematical logic, and it offers formal proofs and concrete examples for all theoretical results.

  6. Privacy context model for dynamic privacy adaptation in ubiquitous computing

    NARCIS (Netherlands)

    Schaub, Florian; Koenings, Bastian; Dietzel, Stefan; Weber, M.; Kargl, Frank

    Ubiquitous computing is characterized by the merger of physical and virtual worlds as physical artifacts gain digital sensing, processing, and communication capabilities. Maintaining an appropriate level of privacy in the face of such complex and often highly dynamic systems is challenging. We argue

  7. Netherlands foundation for radioastronomy

    International Nuclear Information System (INIS)

    1979-01-01

    A report of the board is followed by departmental reports from the Westerbork Telescope Group, Dwingeloo Telescope Group, Computer Group, Laboratory and Central Technical Services, Astronomy Group, Administration of the Foundation/General Affairs and Personnel Council. Astronomical reports describe radio astronomical research carried out by the Foundation staff and at the Kapteyn Laboratory Groningen, Leiden Observatory, Utrecht Observatory and the Laboratorio di Radioastronomia Bologna, Italy. Progress in the extension of the synthesis radio telescope and investigations into the possibility of substantially increasing the SRT data rate for solar observations, are outlined. Appendices shows the organisational structure, the names of the employees, the operating budget, the observing facilities at Westerbork and Dwingeloo, and the publications and reports published in 1978 and related to observations made with these facilities. (C.F.)

  8. Mathematical foundations of thermodynamics

    CERN Document Server

    Giles, R; Stark, M; Ulam, S

    2013-01-01

    Mathematical Foundations of Thermodynamics details the core concepts of the mathematical principles employed in thermodynamics. The book discusses the topics in a way that physical meanings are assigned to the theoretical terms. The coverage of the text includes the mechanical systems and adiabatic processes; topological considerations; and equilibrium states and potentials. The book also covers Galilean thermodynamics; symmetry in thermodynamics; and special relativistic thermodynamics. The book will be of great interest to practitioners and researchers of disciplines that deal with thermodyn

  9. Topological Foundations of Electromagnetism

    CERN Document Server

    Barrett, Terrence W

    2008-01-01

    Topological Foundations of Electromagnetism seeks a fundamental understanding of the dynamics of electromagnetism; and marshals the evidence that in certain precisely defined topological conditions, electromagnetic theory (Maxwell's theory) must be extended or generalized in order to provide an explanation and understanding of, until now, unusual electromagnetic phenomena. Key to this generalization is an understanding of the circumstances under which the so-called A potential fields have physical effects. Basic to the approach taken is that the topological composition of electromagnetic field

  10. Foundations for Moral Relativism

    OpenAIRE

    Velleman, J. David

    2015-01-01

    In this new edition of Foundations for Moral Relativism, a distinguished moral philosopher tames a bugbear of current debate about cultural difference. J. David Velleman shows that different communities can indeed be subject to incompatible moralities, because their local mores are rationally binding. At the same time, he explains why the mores of different communities, even when incompatible, are still variations on the same moral themes. The book thus maps out a universe of many moral world...

  11. Wronski's Foundations of Mathematics.

    Science.gov (United States)

    Wagner, Roi

    2016-09-01

    Argument This paper reconstructs Wronski's philosophical foundations of mathematics. It uses his critique of Lagrange's algebraic analysis as a vignette to introduce the problems that he raised, and argues that these problems have not been properly appreciated by his contemporaries and subsequent commentators. The paper goes on to reconstruct Wronski's mathematical law of creation and his notions of theory and techne, in order to put his objections to Lagrange in their philosophical context. Finally, Wronski's proof of his universal law (the expansion of a given function by any series of functions) is reviewed in terms of the above reconstruction. I argue that Wronski's philosophical approach poses an alternative to the views of his contemporary mainstream mathematicians, which brings up the contingency of their choices, and bridges the foundational concerns of early modernity with those of the twentieth-century foundations crisis. I also argue that Wronski's views may be useful to contemporary philosophy of mathematical practice, if they are read against their metaphysical grain.

  12. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... of the companies have comprehensive privacy programs, although more than half of them voice moral or relational motives for addressing online privacy. The privacy measures they have taken are primarily compliance measures, while measures that stimulate a stakeholder dialogue are rare. Overall, a wide variety...

  13. The Regulatory Framework for Privacy and Security

    Science.gov (United States)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  14. Adding Query Privacy to Robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2011-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... of obtaining query privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity and only a small overhead in the computational complexity....

  15. Use of reinforced soil foundation (RSF) to support shallow foundation.

    Science.gov (United States)

    2008-11-01

    The main objective of this research study is to investigate potential benefits of using the reinforced soil foundations to improve the bearing capacity and to reduce the settlement of shallow foundations on soils. This includes examining influences o...

  16. Student Data Privacy Communications Toolkit

    Science.gov (United States)

    Foundation for Excellence in Education, 2016

    2016-01-01

    Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…

  17. Privacy proof in the cloud

    NARCIS (Netherlands)

    Jessen, Veerle; Weigand, Hans; Mouratidis, Haris

    Cloud computing has been a frequently researched subject as it brings many advantages, such as the ability to store data remotely and scale rapidly, but also comes with several issues, including privacy, trust and security. The decision whether it is best to go `into the cloud' or to `stay inside'

  18. Patient privacy and social media.

    Science.gov (United States)

    Hader, Amy L; Brown, Evan D

    2010-08-01

    Healthcare providers using social media must remain mindful of professional boundaries and patients' privacy rights. Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics.

  19. Facebook: When Education Meets Privacy

    Science.gov (United States)

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  20. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  1. Privacy in Online Social Networks

    NARCIS (Netherlands)

    Beye, Michael; Jeckmans, Arjan; Erkin, Zekeriya; Erkin, Zekeriya; Hartel, Pieter H.; Lagendijk, Reginald; Tang, Qiang; Abraham, A.

    Online Social Networks (OSNs) have become part of daily life for millions of users. Users building explicit networks that represent their social relationships and often share a wealth of personal information to their own benefit. The potential privacy risks of such behavior are often underestimated

  2. The European Approach to Privacy

    NARCIS (Netherlands)

    van Hoboken, J.

    2014-01-01

    This paper critically assesses the character of European (Union’s) privacy law and policy in the field of online media and electronic communications. Contrary to current understanding, this field of law is more fragmented and ill-developed than is often assumed, in particular by those discussing

  3. Biobanking and Privacy in India.

    Science.gov (United States)

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India. © 2016 American Society of Law, Medicine & Ethics.

  4. 78 FR 46256 - Privacy Act

    Science.gov (United States)

    2013-07-31

    ... FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code of 1954.'' are added at the end of the definition of Act. [FR Doc. 2013-18535 Filed 7...

  5. Privacy concerns in smart cities

    NARCIS (Netherlands)

    E.A. van Zoonen (Liesbet)

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in

  6. Protecting Your Child's Privacy Online

    Science.gov (United States)

    ... Keeping Up With Kids' Apps infographic Kids and Computer Security Kids and Mobile Phones Kids and Socializing Online ... email Looking for business guidance on privacy and ... The Federal Trade Commission (FTC) is the nation’s consumer protection agency. The FTC works to prevent fraudulent, deceptive ...

  7. Bridging the transatlantic divide in privacy

    Directory of Open Access Journals (Sweden)

    Paula Kift

    2013-08-01

    Full Text Available In the context of the US National Security Agency surveillance scandal, the transatlantic privacy divide has come back to the fore. In the United States, the right to privacy is primarily understood as a right to physical privacy, thus the protection from unwarranted government searches and seizures. In Germany on the other hand, it is also understood as a right to spiritual privacy, thus the right of citizens to develop into autonomous moral agents. The following article will discuss the different constitutional assumptions that underlie American and German attitudes towards privacy, namely privacy as an aspect of liberty or as an aspect of dignity. As data flows defy jurisdictional boundaries, however, policymakers across the Atlantic are faced with a conundrum: how can German and American privacy cultures be reconciled?

  8. 77 FR 19740 - Biological Sciences Advisory Committee; Notice of Meeting

    Science.gov (United States)

    2012-04-02

    ... NATIONAL SCIENCE FOUNDATION Biological Sciences Advisory Committee; Notice of Meeting In accordance with the Federal Advisory Committee Act (Pub. L., 92- 463, as amended), the National Science Foundation announces the following meeting: Name: Biological Sciences Advisory Committee ( 1110). Date and...

  9. The social life of genes: privacy, property and the new genetics.

    Science.gov (United States)

    Everett, Margaret

    2003-01-01

    With the advent of the Human Genome Project and widespread fears over human cloning and medical privacy, a number of states have moved to protect genetic privacy. Oregon's unique Genetic Privacy Act of 1995, which declared that an individual had property rights to their DNA, has provoked national and international interest and controversy. This paper critically reviews the literature on genetic privacy and gene patenting from law, philosophy, science and anthropology. The debate in Oregon, from 1995 to 2001, illustrates many of the key issues in this emerging area. Both sides of the debate invoke the property metaphor, reinforcing deterministic assumptions and avoiding more fundamental questions about the integrity of the body and self-identity. The anthropological critique of the commodification of the body, and the concept of 'embodiment' are useful in analyzing the debate over DNA as property.

  10. Islam and Science

    Science.gov (United States)

    Salam, Abdus

    The following sections are included: * The Holy Quran and Science * Modem Science, A Greco- Islamic Legacy * The Decline of Sciences in Islam * The Limitations of Science * Faith and Science * The Present Picture of Sciences in the Islamic Countries * Renaissance of Sciences in Islam * Steps Needed for Building up Sciences in the Islamic Countries * Science Education * Science Foundations in Islam * Technology in Our Countries * Concluding Remarks * REFERENCES

  11. Vehicular Internet: Security & Privacy Challenges and Opportunities

    Directory of Open Access Journals (Sweden)

    Kamran Zaidi

    2015-07-01

    Full Text Available The vehicular internet will drive the future of vehicular technology and intelligent transportation systems (ITS. Whether it is road safety, infotainment, or driver-less cars, the vehicular internet will lay the foundation for the future of road travel. Governments and companies are pursuing driver-less vehicles as they are considered to be more reliable than humans and, therefore, safer. The vehicles today are not just a means of transportation but are also equipped with a wide range of sensors that provide valuable data. If vehicles are enabled to share data that they collect with other vehicles or authorities for decision-making and safer driving, they thereby form a vehicular network. However, there is a lot at stake in vehicular networks if they are compromised. With the stakes so high, it is imperative that the vehicular networks are secured and made resilient to any attack or attempt that may have serious consequences. The vehicular internet can also be the target of a cyber attack, which can be devastating. In this paper, the opportunities that the vehicular internet offers are presented and then various security and privacy aspects are discussed and some solutions are presented.

  12. Science Topics

    Science.gov (United States)

    EPA is one of the world’s leading environmental and human health research organizations. Science provides the foundation for Agency policies, actions, and decisions made on behalf of the American people.

  13. Static Behaviour of Bucket Foundations

    DEFF Research Database (Denmark)

    Larsen, Kim André

    One new foundation concept in relation to offshore wind turbines is bucket foundations. The concept is known from the oil and gas industry, though the load conditions here are significantly different. The bucket foundation can be used as monopod or e.g. tripod foundations for offshore wind turbines....... The monopod concept is investigated in this thesis, regarding the static behaviour from loads relevant to offshore wind turbines. The main issue in this concept is the rotational stiffness of the foundation and the combined capacity dominated by moments. The vertical bearing capacity of bucket foundations...... theory is proposed. The proposed expression applies to plane strain as well as axis-symmetric stress conditions for foundations with smooth or rough bases. A thorough experimental investigation of the static behaviour of bucket foundations subjected to combined loading is carried out. Laboratory tests...

  14. Unknown foundation determination for scour.

    Science.gov (United States)

    2012-04-01

    Unknown foundations affect about 9,000 bridges in Texas. For bridges over rivers, this creates a problem : regarding scour decisions as the calculated scour depth cannot be compared to the foundation depth, and a : very conservative costly approach m...

  15. Wave Forces on Windturbine Foundations

    DEFF Research Database (Denmark)

    Larsen, Brian Juul; Frigaard, Peter

    A testprogramme has been performed to determine the wave forces on two types of foundations for an offshore windturbine. the tested foundation types are a monopile and cone. Furthermore the shaft of the cone has been tested....

  16. AAA Foundation for Traffic Safety

    Science.gov (United States)

    ... of Top Deadly Mistakes Made by Teen Drivers -- AAA AAA: Road debris causes avoidable crashes, deaths Save the ... and 500 deaths! Foundation News Stay Tuned New AAA Foundation for Traffic Safety website coming Fall 2017 ...

  17. Cultural foundations of strategic management business organization

    OpenAIRE

    I. B. Atamanenko

    2015-01-01

    In modern sociology understanding of social and cultural factors of strategic activities of market economy is limited and based on perceptions of managerian interaction with organizations to competitive environment. As a result, not enough attention is paid to the cultural and social foundations of the strategy of competition and the staff as an active subject of forming strategic policy organization is excluded out the analysis. In addition, the domestic science understanding of business org...

  18. Foundation helps refurbish buildings

    International Nuclear Information System (INIS)

    Camenzind, B.

    2006-01-01

    This article looks at the activities of the Swiss 'Climate-Cent' foundation, which is helping support the energetic refurbishment of building envelopes. The conditions which have to be fulfilled to receive grants are explained. Work supported includes the replacement of windows and the insulation of roofs and attics as well as outside walls. Details on the financial support provided and examples of projects supported are given. The source of the finance needed to provide such support - a voluntary levy on petrol - and further support provided in certain Swiss cantons is commented on

  19. Mathematical foundations of elasticity

    CERN Document Server

    Marsden, Jerrold E

    1994-01-01

    This advanced-level study approaches mathematical foundations of three-dimensional elasticity using modern differential geometry and functional analysis. It is directed to mathematicians, engineers and physicists who wish to see this classical subject in a modern setting with examples of newer mathematical contributions. Prerequisites include a solid background in advanced calculus and the basics of geometry and functional analysis.The first two chapters cover the background geometry ― developed as needed ― and use this discussion to obtain the basic results on kinematics and dynamics of con

  20. Web services foundations

    CERN Document Server

    Bouguettaya, Athman; Daniel, Florian

    2013-01-01

    Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application logic encapsulated by Web services. Web services could be considered the best-known and most standardized technology in use today for distributed computing over the Internet.Web Services Foundations is the first installment of a two-book collection coverin

  1. Instant Zurb Foundation 4

    CERN Document Server

    Arévalo, Jorge

    2013-01-01

    A quick and easy guide that follows a practical approach to rapidly create responsive web pages using Foundation 4 framework, following the mobile-first philosophy.If you are a web developer who wants to get the most out of your HTML5/CSS/JavaScript skills, this book is ideal for you. It is assumed that you will have some experience with these languages, but for those who don't, you can also be up and running in an instant.

  2. Morris Animal Foundation

    Science.gov (United States)

    ... Yours Today » Give the Gift of Health to Animals This Holiday Season. Until December 31, your gift ... bizarre molecules. Learn More » A Tireless Advocate for Animals and Science. “If it has a heartbeat, I ...

  3. Problem solving in foundation engineering using foundationPro

    CERN Document Server

    Yamin, Mohammad

    2016-01-01

    This book is at once a supplement to traditional foundation engineering textbooks and an independent problem-solving learning tool. The book is written primarily for university students majoring in civil or construction engineering taking foundation analysis and design courses to encourage them to solve design problems. Its main aim is to stimulate problem solving capability and foster self-directed learning. It also explains the use of the foundationPro software, available at no cost, and includes a set of foundation engineering applications. Taking a unique approach, Dr. Yamin summarizes the general step-by-step procedure to solve various foundation engineering problems, illustrates traditional applications of these steps with longhand solutions, and presents the foundationPro solutions. The special structure of the book allows it to be used in undergraduate and graduate foundation design and analysis courses in civil and construction engineering. The book stands as valuable resource for students, faculty, ...

  4. Management of science policy, sociology of science policy and economics of science policy

    CERN Document Server

    Ruivo, Beatriz

    2017-01-01

    'Management of science policy, sociology of science policy and economics of science policy' is a theoretical essay on the scientific foundation of science policy (formulation, implementation, instruments and procedures). It can be also used as a textbook.

  5. Mathematical foundations of biomechanics.

    Science.gov (United States)

    Niederer, Peter F

    2010-01-01

    The aim of biomechanics is the analysis of the structure and function of humans, animals, and plants by means of the methods of mechanics. Its foundations are in particular embedded in mathematics, physics, and informatics. Due to the inherent multidisciplinary character deriving from its aim, biomechanics has numerous connections and overlapping areas with biology, biochemistry, physiology, and pathophysiology, along with clinical medicine, so its range is enormously wide. This treatise is mainly meant to serve as an introduction and overview for readers and students who intend to acquire a basic understanding of the mathematical principles and mechanics that constitute the foundation of biomechanics; accordingly, its contents are limited to basic theoretical principles of general validity and long-range significance. Selected examples are included that are representative for the problems treated in biomechanics. Although ultimate mathematical generality is not in the foreground, an attempt is made to derive the theory from basic principles. A concise and systematic formulation is thereby intended with the aim that the reader is provided with a working knowledge. It is assumed that he or she is familiar with the principles of calculus, vector analysis, and linear algebra.

  6. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  7. 16 CFR 313.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  8. 12 CFR 716.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  9. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  10. 32 CFR 701.101 - Privacy program terms and definitions.

    Science.gov (United States)

    2010-07-01

    ... from a project on privacy issues, identifying and resolving the privacy risks, and approval by a... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy program terms and definitions. 701.101... DEPARTMENT OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.101 Privacy program terms and...

  11. Tales from the dark side: Privacy dark strategies and privacy dark patterns

    DEFF Research Database (Denmark)

    Bösch, Christoph; Erb, Benjamin; Kargl, Frank

    2016-01-01

    Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach. While they support a privacy-aware development process for IT systems, the concepts used by malicious, privacy-threatening parties are generally less understood and known. We argue...... that understanding the “dark side”, namely how personal data is abused, is of equal importance. In this paper, we introduce the concept of privacy dark strategies and privacy dark patterns and present a framework that collects, documents, and analyzes such malicious concepts. In addition, we investigate from...... a psychological perspective why privacy dark strategies are effective. The resulting framework allows for a better understanding of these dark concepts, fosters awareness, and supports the development of countermeasures. We aim to contribute to an easier detection and successive removal of such approaches from...

  12. Privacy Protection: Mandating New Arrangements to Implement and Assess Federal Privacy Policy and Practice

    National Research Council Canada - National Science Library

    Relyea, Harold C

    2004-01-01

    When Congress enacted the Privacy Act of 1974, it established a temporary national study commission to conduct a comprehensive assessment of privacy policy and practice in both the public and private...

  13. Foundations for the future

    CERN Multimedia

    2010-01-01

    Since this is the last Bulletin of 2010, this will be the last word from the Director-General for this remarkable year. I’d like to use it to share some of my reflections on how important it is for CERN, and for science, that the LHC has worked so very well. The scientific results are remarkable, but it’s the political legacy of the LHC’s first year of running that I’d like to talk about here.   Whenever economies are slow, as they are now, basic science comes under pressure as governments look to applied science for winners. Basic science takes too long to deliver products to market – so the conventional logic goes – and it’s much better to concentrate on the applied. There’s merit to this logic, but it’s no cure-all for the economy. We need a broadly balanced approach to science that includes basic and applied research, that harnesses the power of the new media to ensure open access to knowledge, and that...

  14. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  15. Trust and Privacy in Healthcare

    Science.gov (United States)

    Singleton, Peter; Kalra, Dipak

    This paper considers issues of trust and privacy in healthcare around increased data-sharing through Electronic Health Records (EHRs). It uses a model structured around different aspects of trust in the healthcare organisation’s reasons for greater data-sharing and their ability to execute EHR projects, particularly any associated confidentiality controls. It reflects the individual’s personal circumstances and attitude to use of health records.

  16. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  17. Fictional privacy among Facebook users.

    Science.gov (United States)

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  18. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  19. Radiation Effects Research Foundation

    International Nuclear Information System (INIS)

    1979-01-01

    The last day of March 1978 marked the completion of the first 3 years of operation of the Radiation Effects Research Foundation in Hiroshima and Nagasaki. RERF was established on 1 April 1975 as successor to the Atomic Bomb Casualty Commission which had been in continuous operation since 1947. This record of the first 3 years of operation consists of selected reports and other documents prepared in the course of conducting the business of RERF and includes a brief history, a late radiation effects that might be conducted at RERF. The wisdom and thought given to the research program and its operation by the Scientific Council and the Board of Directors is reflected in the minutes of their meetings which are included in the Appendix. (Mori, K.)

  20. Foundations of quantum gravity

    CERN Document Server

    Lindesay, James

    2013-01-01

    Exploring how the subtleties of quantum coherence can be consistently incorporated into Einstein’s theory of gravitation, this book is ideal for researchers interested in the foundations of relativity and quantum physics. The book examines those properties of coherent gravitating systems that are most closely connected to experimental observations. Examples of consistent co-gravitating quantum systems whose overall effects upon the geometry are independent of the coherence state of each constituent are provided, and the properties of the trapping regions of non-singular black objects, black holes, and a dynamic de Sitter cosmology are discussed analytically, numerically, and diagrammatically. The extensive use of diagrams to summarise the results of the mathematics enables readers to bypass the need for a detailed understanding of the steps involved. Assuming some knowledge of quantum physics and relativity, the book provides textboxes featuring supplementary information for readers particularly interested ...

  1. Foundations of signal processing

    CERN Document Server

    Vetterli, Martin; Goyal, Vivek K

    2014-01-01

    This comprehensive and engaging textbook introduces the basic principles and techniques of signal processing, from the fundamental ideas of signals and systems theory to real-world applications. Students are introduced to the powerful foundations of modern signal processing, including the basic geometry of Hilbert space, the mathematics of Fourier transforms, and essentials of sampling, interpolation, approximation and compression. The authors discuss real-world issues and hurdles to using these tools, and ways of adapting them to overcome problems of finiteness and localisation, the limitations of uncertainty and computational costs. Standard engineering notation is used throughout, making mathematical examples easy for students to follow, understand and apply. It includes over 150 homework problems and over 180 worked examples, specifically designed to test and expand students' understanding of the fundamentals of signal processing, and is accompanied by extensive online materials designed to aid learning, ...

  2. Online Tracking Technologies and Web Privacy:Technologieën voor Online volgen en Web Privacy

    OpenAIRE

    Acar, Mustafa Gunes Can

    2017-01-01

    In my PhD thesis, I would like to study the problem of online privacy with a focus on Web and mobile applications. Key research questions to be addressed by my study are the following: How can we formalize and quantify web tracking? What are the threats presented against privacy by different tracking techniques such as browser fingerprinting and cookie based tracking? What kind of privacy enhancing technologies (PET) can be used to ensure privacy without degrading service quality? The stud...

  3. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    Science.gov (United States)

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  4. Portrait of a Privacy Invasion

    Directory of Open Access Journals (Sweden)

    Shoshitaishvili Yan

    2015-04-01

    Full Text Available The popularity of online social networks has changed the way in which we share personal thoughts, political views, and pictures. Pictures have a particularly important role in the privacy of users, as they can convey substantial information (e.g., a person was attending an event, or has met with another person. Moreover, because of the nature of social networks, it has become increasingly difficult to control who has access to which content. Therefore, when a substantial amount of pictures are accessible to one party, there is a very serious potential for violations of the privacy of users. In this paper, we demonstrate a novel technique that, given a large corpus of pictures shared on a social network, automatically determines who is dating whom, with reasonable precision. More specifically, our approach combines facial recognition, spatial analysis, and machine learning techniques to determine pairs that are dating. To the best of our knowledge, this is the first privacy attack of this kind performed on social networks. We implemented our approach in a tool, called Creepic, and evaluated it on two real-world datasets. The results show that it is possible to automatically extract non-obvious, and nondisclosed, relationships between people represented in a group of pictures, even when the people involved are not directly part of a connected social clique.

  5. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  6. PRIVACY PROTECTION PROBLEMS IN SOCIAL NETWORKS

    OpenAIRE

    OKUR, M. Cudi

    2011-01-01

    Protecting privacy has become a major concern for most social network users because of increased difficulties of controlling the online data. This article presents an assessment of the common privacy related risks of social networking sites. Open and hidden privacy risks of active and passive online profiles are examined and increasing share of social networking in these phenomena is discussed. Inadequacy of available legal and institutional protection is demonstrated and the effectiveness of...

  7. Facebook: Personality and privacy on profiles

    OpenAIRE

    Casado Riera, Carla; Oberst, Ursula; Carbonell, Xavier

    2015-01-01

    The aim of this study was to study the possible relationship between the privacy settings in Facebook profiles and two personality dimensions, extraversion and neuroticism, in relation to gender. The Privacy on Facebook Questionnaire and the Eysenck Personality Inventory was applied to a sample of 92 womenand 70 men, all users of Facebook. No significant relationship was found between extraversion or neuroticism and the privacy settings of Facebook profiles, but the results showed significant...

  8. An Alternative View of Privacy on Facebook

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2011-02-01

    Full Text Available The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy tends to ignore the political economy of privacy in capitalism that can mask socio-economic inequality and protect capital and the rich from public accountability. Facebook is in this paper analyzed with the help of an approach, in which privacy for dominant groups, in regard to the ability of keeping wealth and power secret from the public, is seen as problematic, whereas privacy at the bottom of the power pyramid for consumers and normal citizens is seen as a protection from dominant interests. Facebook’s privacy concept is based on an understanding that stresses self-regulation and on an individualistic understanding of privacy. The theoretical analysis of the political economy of privacy on Facebook in this paper is based on the political theories of Karl Marx, Hannah Arendt and Jürgen Habermas. Based on the political economist Dallas Smythe’s concept of audience commodification, the process of prosumer commodification on Facebook is analyzed. The political economy of privacy on Facebook is analyzed with the help of a theory of drives that is grounded in Herbert Marcuse’s interpretation of Sigmund Freud, which allows to analyze Facebook based on the concept of play labor (= the convergence of play and labor.

  9. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  10. A Model-Based Privacy Compliance Checker

    OpenAIRE

    Siani Pearson; Damien Allison

    2009-01-01

    Increasingly, e-business organisations are coming under pressure to be compliant to a range of privacy legislation, policies and best practice. There is a clear need for high-level management and administrators to be able to assess in a dynamic, customisable way the degree to which their enterprise complies with these. We outline a solution to this problem in the form of a model-driven automated privacy process analysis and configuration checking system. This system models privacy compliance ...

  11. Privacy Preservation in Distributed Subgradient Optimization Algorithms

    OpenAIRE

    Lou, Youcheng; Yu, Lean; Wang, Shouyang

    2015-01-01

    Privacy preservation is becoming an increasingly important issue in data mining and machine learning. In this paper, we consider the privacy preserving features of distributed subgradient optimization algorithms. We first show that a well-known distributed subgradient synchronous optimization algorithm, in which all agents make their optimization updates simultaneously at all times, is not privacy preserving in the sense that the malicious agent can learn other agents' subgradients asymptotic...

  12. Negotiating privacy in surveillant welfare relations

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Lauritsen, Peter; Bøge, Ask Risom

    . However, while privacy is central to debates of surveillance, it has proven less productive as an analytical resource for studying surveillance in practice. Consequently, this paper reviews different conceptualisations of privacy in relation to welfare and surveillance and argues for strengthening...... the analytical capacity of the concept by rendering it a situated and relational concept. The argument is developed through a research and design project called Teledialogue meant to improve the relation between case managers and children placed at institutions or in foster families. Privacy in Teledialogue...... notion of privacy are discussed in relation to both research- and public debates on surveillance in a welfare setting....

  13. Analysis of Privacy on Social Networks

    OpenAIRE

    Tomandl, Luboš

    2015-01-01

    This thesis deals with a question of privacy in a context of social networks. The main substance of these services is the users' option to share an information about their lives. This alone can be a problem for privacy. In the first part of this thesis concentrates on the meaning of privacy as well as its value for both individuals and the society. In the next part the privacy threats on social networks, namely Facebook, are discussed. These threats are disclosed on four levels according to f...

  14. Privacy Protection Research of Mobile RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Radio Frequency Identification is one of the most controversial technologies at present.It is very difficult to detect who reads a tag incorporated into products owned by a person,a significant concern to privacy threats in RFID system arises from this reason.User privacy problem is prior considersion for mobile RFID service,because most mobile RFID service based on end-user service.Propose a solution for user privacy protection,which is a modification of EPC Class 1 Generation 2 protocol,and introduce a privacy protection scenario for mobile RFID service using this method.

  15. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  16. Customer privacy on UK healthcare websites.

    Science.gov (United States)

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  17. Extending SQL to Support Privacy Policies

    Science.gov (United States)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  18. Toward Privacy-Preserving Personalized Recommendation Services

    Directory of Open Access Journals (Sweden)

    Cong Wang

    2018-02-01

    Full Text Available Recommendation systems are crucially important for the delivery of personalized services to users. With personalized recommendation services, users can enjoy a variety of targeted recommendations such as movies, books, ads, restaurants, and more. In addition, personalized recommendation services have become extremely effective revenue drivers for online business. Despite the great benefits, deploying personalized recommendation services typically requires the collection of users’ personal data for processing and analytics, which undesirably makes users susceptible to serious privacy violation issues. Therefore, it is of paramount importance to develop practical privacy-preserving techniques to maintain the intelligence of personalized recommendation services while respecting user privacy. In this paper, we provide a comprehensive survey of the literature related to personalized recommendation services with privacy protection. We present the general architecture of personalized recommendation systems, the privacy issues therein, and existing works that focus on privacy-preserving personalized recommendation services. We classify the existing works according to their underlying techniques for personalized recommendation and privacy protection, and thoroughly discuss and compare their merits and demerits, especially in terms of privacy and recommendation accuracy. We also identity some future research directions. Keywords: Privacy protection, Personalized recommendation services, Targeted delivery, Collaborative filtering, Machine learning

  19. Do Privacy Concerns Matter for Millennials?

    DEFF Research Database (Denmark)

    Fodor, Mark; Brem, Alexander

    2015-01-01

    data have raised the question, if location data are considered as sensitive data by users. Thus, we use two privacy concern models, namely Concern for Information Privacy (CFIP) and Internet Users’ Information Privacy Concerns (IUIPC) to find out. Our sample comprises of 235 individuals between 18...... and 34 years (Generation C) from Germany. The results of this study indicate that the second-order factor IUIPC showed better fit for the underlying data than CFIP did. Overall privacy concerns have been found to have an impact on behavioral intentions of users for LBS adoption. Furthermore, other risk...

  20. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  1. Foundations for Gerontological Education.

    Science.gov (United States)

    Johnson, Harold R.; And Others

    1980-01-01

    Focuses on: (1) components of a basic core of knowledge essential for all people working in the field of aging; (2) knowledge essential for professions related to biomedical science, human services, social and physical environment; and (3) knowledge essential for clinical psychology, nursing, nutrition, and social work. (Author)

  2. Excavationless Exterior Foundation Insulation Field Study

    Energy Technology Data Exchange (ETDEWEB)

    Schirber, T.; Mosiman, G.; Ojczyk, C.

    2014-10-01

    Building science research supports installing exterior (soil side) foundation insulation as the optimal method to enhance the hygrothermal performance of new homes. With exterior foundation insulation, water management strategies are maximized while insulating the basement space and ensuring a more even temperature at the foundation wall. However, such an approach can be very costly and disruptive when applied to an existing home, requiring deep excavation around the entire house. The NorthernSTAR Building America Partnership team implemented an innovative, minimally invasive foundation insulation upgrade technique on an existing home. The approach consisted of using hydrovac excavation technology combined with a liquid insulating foam. The team was able to excavate a continuous 4" wide by 4' to 5' deep trench around the entire house, 128 linear feet, except for one small part under the stoop that was obstructed with concrete debris. The combination pressure washer and vacuum extraction technology also enabled the elimination of large trenches and soil stockpiles normally produced by backhoe excavation. The resulting trench was filled with liquid insulating foam, which also served as a water-control layer of the assembly. The insulation was brought above grade using a liquid foam/rigid foam hybrid system and terminated at the top of the rim joist. Cost savings over the traditional excavation process ranged from 23% to 50%. The excavationless process could result in even greater savings since replacement of building structures, exterior features, utility meters, and landscaping would be minimal or non-existent in an excavationless process.

  3. Excavationless Exterior Foundation Insulation Field Study

    Energy Technology Data Exchange (ETDEWEB)

    Schirber, T. [NorthernSTAR, Minneaplolis, MN (United States); Mosiman, G. [NorthernSTAR, Minneaplolis, MN (United States); Ojczyk, C. [NorthernSTAR, Minneaplolis, MN (United States)

    2014-09-01

    Building science research supports installing exterior (soil side) foundation insulation as the optimal method to enhance the hygrothermal performance of new homes. With exterior foundation insulation, water management strategies are maximized while insulating the basement space and ensuring a more even temperature at the foundation wall. However, such an approach can be very costly and disruptive when applied to an existing home, requiring deep excavation around the entire house. The NorthernSTAR Building America Partnership team implemented an innovative, minimally invasive foundation insulation upgrade technique on an existing home. The approach consisted of using hydrovac excavation technology combined with liquid insulating foam. The team was able to excavate a continuous 4 inches wide by 4 feet to 5 feet deep trench around the entire house, 128 linear feet, except for one small part under the stoop that was obstructed with concrete debris. The combination pressure washer and vacuum extraction technology also enabled the elimination of large trenches and soil stockpiles normally produced by backhoe excavation. The resulting trench was filled with liquid insulating foam, which also served as a water-control layer of the assembly. The insulation was brought above grade using a liquid foam/rigid foam hybrid system and terminated at the top of the rim joist. Cost savings over the traditional excavation process ranged from 23% to 50%. The excavationless process could result in even greater savings since replacement of building structures, exterior features, utility meters, and landscaping would be minimal or non-existent in an excavationless process.

  4. [Analysis of projects received and funded in fields of emergency and intensive care medicine/trauma/burns/plastic surgery from National Natural Science Foundation of China during 2010-2013].

    Science.gov (United States)

    Xiong, Kun; Wang, Linlin; Chen, Xulin; Cao, Yongqian; Xiang, Chuan; Xue, Lixiang; Yan, Zhangcai

    2014-01-01

    To summarized the projects received and funded in the fields of emergency and intensive care medicine/trauma/burns/plastic surgery from National Natural Science Foundation of China (NSFC) during 2010-2013, put forward the thinking and perspective of this future trend in these fields. The number of the funded project and total funding in the fields of emergency and intensive care medicine/trauma/burns/plastic surgery from NSFC during 2010-2013 had been statistical analyzed, in the meantime, the overview situation of various branches in basic research and further preliminary analysis the research frontier and hot issues have been analyzed. (1) The number of funded project were 581 in H15 of NSFC during 2010-2013, total funding reached to 277.13 million RMB, including 117 projects in H1511 (emergency and intensive care medicine/trauma/burns/plastic surgery and other science issue), 96 projects in H1507 (wound healing and scar), 88 projects in H1502 (multi-organ failure), 71 projects in H1505 (burn), 61 projects in H1504 (trauma). (2) The top 10 working unit for project funding in the field of emergency and intensive care medicine/trauma/burns/plastic surgery present as Third Military Medical University (70), Shanghai Jiao tong University (69), Second Military Medical University (40), Chinese PLA General Hospital (36), Forth Military Medical University (35), Zhejiang University (22), Sun Yat-Sen University (18), Southern Medical University (14), China Medical University (11), Capital Medical University (11) respectively, the number of funded project positive correlated with funding. (3) The funded research field in H15 covered almost all important organs and system injury or repair research, our scientists reached a fairly high level in some research field, for example, sepsis, trauma, repair, et al. "Sepsis" was funded 112 projects in H15 for 4 years, the growth rate became rapid and stable comparing to shock, burns and cardiopulmonary resuscitation funded projects

  5. Digital privacy in the marketplace perspectives on the information exchange

    CERN Document Server

    Milne, George

    2015-01-01

    Digital Privacy in the Marketplace focuses on the data ex-changes between marketers and consumers, with special ttention to the privacy challenges that are brought about by new information technologies. The purpose of this book is to provide a background source to help the reader think more deeply about the impact of privacy issues on both consumers and marketers. It covers topics such as: why privacy is needed, the technological, historical and academic theories of privacy, how market exchange af-fects privacy, what are the privacy harms and protections available, and what is the likely future of privacy.

  6. The logical foundations of mathematics

    CERN Document Server

    Hatcher, William S

    1981-01-01

    The Logical Foundations of Mathematics offers a study of the foundations of mathematics, stressing comparisons between and critical analyses of the major non-constructive foundational systems. The position of constructivism within the spectrum of foundational philosophies is discussed, along with the exact relationship between topos theory and set theory.Comprised of eight chapters, this book begins with an introduction to first-order logic. In particular, two complete systems of axioms and rules for the first-order predicate calculus are given, one for efficiency in proving metatheorems, and

  7. Sudden Arrhythmia Death Syndromes (SADS) Foundation

    Science.gov (United States)

    ... SADS Foundation UK SADS Foundation Netherlands SADS Foundation China SADS Foundation Hong Kong Search for: Log in ... research crucial for health of patients and the economy 7/18/2017 More funding for heart disease ...

  8. From quantum foundations to applications and back.

    Science.gov (United States)

    Gisin, Nicolas; Fröwis, Florian

    2018-07-13

    Quantum non-locality has been an extremely fruitful subject of research, leading the scientific revolution towards quantum information science, in particular, to device-independent quantum information processing. We argue that the time is ripe to work on another basic problem in the foundations of quantum physics, the quantum measurement problem, which should produce good physics in theoretical, mathematical, experimental and applied physics. We briefly review how quantum non-locality contributed to physics (including some outstanding open problems) and suggest ways in which questions around macroscopic quantumness could equally contribute to all aspects of physics.This article is part of a discussion meeting issue 'Foundations of quantum mechanics and their impact on contemporary society'. © 2018 The Author(s).

  9. THE PHILOSOPHICAL FOUNDATIONS OF MODERN BIOENGINEERING

    Directory of Open Access Journals (Sweden)

    Ibrahim A. Shogar

    2017-12-01

    Full Text Available This paper investigates the philosophical foundations of modern bioengineering to articulate its ethical framework. Engineering as an ultimate mechanism to transform knowledge into practice is essential for both physical and biological sciences. It reduces data, concepts, and designs to pictorial forms. The integration of engineering with the newly emerging biosciences, has presented a unique opportunity to overcome the major challenges that face the environmental and human health. To harness potentials of bioengineering and establish a sustainable foundation for green technology, modern scientists and engineers need to be acquainted with the normative questions of science. In addition to acquiring the general principles of scientific research and identifying the intrinsic goals of the endeavour, philosophy of bioengineering exposes bioengineers to both the descriptive ‘how’ questions of the physical world as well as the normative ‘why’ questions of values. Such an interdisciplinary approach is significant, not only for inspiring to acquire the genuine knowledge of the existing world, but also to expose the bioengineers to their ethical and social responsibilities. Besides introducing the conceptual framework of bioengineering, this paper has investigated the three major philosophies that have been dominating the theoretical presuppositions of scientific research method in history. Namely, (i Systems biology approach; (ii Evolutionary biology approach; and (iii Mechanical view approach. To establish the ethical foundation of modern bioengineering, the paper, also has conducted an analytical study on various branches of the emerging discipline of bioscience. The paper has concluded that adopting the interdisciplinary approach in research and education is essential to harness potentials of bioengineering and to establish foundations of green technology. To achieve the final objectives of bioengineering, both the practical and theoretical

  10. Privacy and Psychosomatic Stress: An Empirical Analysis.

    Science.gov (United States)

    Webb, Stephen D.

    1978-01-01

    Examines the supposition that insufficient privacy is stressful to the individual. Data were obtained from urban centers in New Zealand. Findings support the hypothesis that a percieved lack of privacy is associated with psychosomatic stress. The relationship is specified by measures of stress and sex of respondents. (Author)

  11. 76 FR 51869 - Privacy Act Implementation

    Science.gov (United States)

    2011-08-19

    ... permanent residence. Maintain includes collect, use, disseminate, or control. Privacy Act means the Privacy... announces the creation, deletion, or amendment of one or more system of records. System of records notices... reference and university libraries or electronically at the [[Page 51873

  12. Just in Time Research: Privacy Practices

    Science.gov (United States)

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  13. Differential privacy in intelligent transportation systems

    NARCIS (Netherlands)

    Kargl, Frank; Friedman, Arik; Boreli, Roksana

    2013-01-01

    In this paper, we investigate how the concept of differential privacy can be applied to Intelligent Transportation Systems (ITS), focusing on protection of Floating Car Data (FCD) stored and processed in central Traffic Data Centers (TDC). We illustrate an integration of differential privacy with

  14. Online privacy: overview and preliminary research

    Directory of Open Access Journals (Sweden)

    Renata Mekovec

    2010-12-01

    Full Text Available Normal 0 21 false false false HR X-NONE X-NONE MicrosoftInternetExplorer4 Over the last decade using the Internet for online shopping, information browsing and searching as well as for online communication has become part of everyday life. Although the Internet technology has a lot of benefits for users, one of the most important disadvantages is related to the increasing capacity for users’ online activity surveillance. However, the users are increasingly becoming aware of online surveillance methods, which results in their increased concern for privacy protection. Numerous factors influence the way in which individuals perceive the level of privacy protection when they are online. This article provides a review of factors that influence the privacy perception of Internet users. Previous online privacy research related to e-business was predominantly focused on the dimension of information privacy and concerned with the way users’ personal information is collected, saved and used by an online company. This article’s main aim is to provide an overview of numerous Internet users’ privacy perception elements across various privacy dimensions as well as their potential categorization. In addition, considering that e-banking and online shopping are one of the most widely used e-services, an examination of online privacy perception of e-banking/online shopping users was performed. 

  15. Privacy een grondrecht, maar ook handelswaar

    NARCIS (Netherlands)

    Olsthoorn, P.

    2015-01-01

    Snoeihard uit journalist Brenno de Winter zijn commentaar op sprekers over privacy tijdens het NLIGF congres 2015. Hij zet Bart Schermer, adviseur van bedrijven en organisaties in de hoek. Die heeft net betoogd dat privacy geen juk (‘korvee’) mag vormen maar inzet moet zijn van innovatie door

  16. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  17. Revocable privacy: Principles, use cases, and technologies

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Security and privacy often seem to be at odds with one another. In this paper, we revisit the design principle of revocable privacy which guides the creation of systems that offer anonymity for people who do not violate a predefined rule, but can still have consequences for people who do violate the

  18. Privacy-Preserving Location-Based Services

    Science.gov (United States)

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  19. Towards quantum-based privacy and voting

    International Nuclear Information System (INIS)

    Hillery, Mark; Ziman, Mario; Buzek, Vladimir; Bielikova, Martina

    2006-01-01

    The privacy of communicating participants is often of paramount importance, but in some situations it is an essential condition. A typical example is a fair (secret) voting. We analyze in detail communication privacy based on quantum resources, and we propose new quantum protocols. Possible generalizations that would lead to voting schemes are discussed

  20. Contemporary Privacy Theory Contributions to Learning Analytics

    Science.gov (United States)

    Heath, Jennifer

    2014-01-01

    With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems…