Historic Waste-Site Use and Geotechnical Characterization—Data Sources and Data Utility

Author(s):  
CD Elifrits ◽  
AW Hatheway
2014 ◽  
Vol 9 (1) ◽  
pp. 12-24
Author(s):  
Michael Comerford

The plethora of new data sources, combined with a growing interest in increased access to previously unpublished data, poses a set of ethical challenges regarding individual privacy. This paper sets out one aspect of those challenges: the need to anonymise data in such a form that protects the privacy of individuals while providing sufficient data utility for data users. This issue is discussed using a case study of Scottish Government’s administrative data, in which disclosure risk is examined and data utility is assessed using a potential ‘real-world’ analysis.


2015 ◽  
Vol 18 (3) ◽  
pp. A20
Author(s):  
M. Gavaghan ◽  
S. Armstrong ◽  
C. Taggart ◽  
S. Garfield

1988 ◽  
Vol 53 (3) ◽  
pp. 523-536 ◽  
Author(s):  
Thomas R. Rocek

Several classes of data collected from Northern Black Mesa, Arizona, are used to identify seasonality among nineteenth- and twentieth-century Navajo sites. The data include informant accounts, site layout and composition, hogan doorway orientations, and terminal tree-ring condition from dendrochronological samples. While each class of data yields information regarding an aspect of site seasonality, analysis reveals that more than one kind of information is represented by the various data sources. Specifically, hogan doorway orientation and tree-ring seasonality provide mutually reinforcing evidence regarding season of site construction; other data relate to the season of site use. These results suggest refinements in the assessment of Navajo site seasonality, as well as providing more general information regarding the identification of site season in archaeological contexts. In addition, the recognition of the alternative seasonal information provided by the different kinds of data, suggests new approaches to analysis of mobility and activity patterns.


PLoS ONE ◽  
2021 ◽  
Vol 16 (11) ◽  
pp. e0259120
Author(s):  
Marco Pittarello ◽  
Simone Ravetto Enri ◽  
Michele Lonati ◽  
Giampiero Lombardi

Regardless of the issue, most of the research carried out on summer pastures of European Alps had to consider the effects of grazing management, as it is an intrinsic component of alpine environment. The management intensity of grazing livestock is measured in terms of livestock stocking rate, but not always a direct measure of it is easily retrievable. Therefore, the aim of the research was to test the reliability of proxies easily retrievable from open data sources (i.e. slope and distance from buildings) in approximating the pastoral site-use intensity. To test the proxies’ effectiveness two different approaches were used. With the first one, the proxies’ reliability was assessed in a case-study conducted at farm scale by using the number of positions gathered with GPS collars, which are a reliable measure of livestock site-use intensity. With the second, the proxies’ reliability was assessed by means of five Vegetation Ecological Groups (VEGs), used as a tool for indirect quantification of livestock site-use intensity at regional scale (thirty-two alpine valleys of the Western Italian Alps, Piedmont Region—Italy). At farm scale, distance from buildings and slope were both reliable predictors of the number of GPS locations as assessed with a Generalized Additive Model. Results of Generalized Linear Models at the regional scale showed that the values of both the slope and the distance from buildings were able to separate VEGs along the same site-use intensity gradient assessed by modelling the number of GPS locations at farm scale. By testing proxies’ reliability both with a direct (i.e. GPS collar positions) and indirect (i.e. VEGs) measurement of livestock site-use intensity, results indicated that slope and distance from buildings can be considered effective surrogates of site-use intensity gradient in alpine grasslands managed under livestock grazing. Therefore, when the level of site-use intensity in research carried out in alpine summer pastures is not directly available, a reliable solution consists in the use of the terrain slope and the distance from buildings, which are also easily retrievable from open data sources or computable.


Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


Sign in / Sign up

Export Citation Format

Share Document