Is It Privacy or Is It Access Control?

Author(s):  
Sylvia L. Osborn

With the widespread use of online systems, there is an increasing focus on maintaining the privacy of individuals and information about them. This is often referred to as a need for privacy protection. The author briefly examines definitions of privacy in this context, roughly delineating between keeping facts private and statistical privacy that deals with what can be inferred from data sets. Many of the mechanisms used to implement what is commonly thought of as access control are the same ones used to protect privacy. This chapter explores when this is not the case and, in general, the interplay between privacy and access control on the one hand and, on the other hand, the separation of these models from mechanisms for their implementation.

Author(s):  
Sylvia L. Osborn

With the widespread use of online systems, there is an increasing focus on maintaining the privacy of individuals and information about them. This is often referred to as a need for privacy protection. The author briefly examines definitions of privacy in this context, roughly delineating between keeping facts private and statistical privacy that deals with what can be inferred from data sets. Many of the mechanisms used to implement what is commonly thought of as access control are the same ones used to protect privacy. This chapter explores when this is not the case and, in general, the interplay between privacy and access control on the one hand and, on the other hand, the separation of these models from mechanisms for their implementation.


2019 ◽  
pp. 1133-1141
Author(s):  
Sylvia L. Osborn

With the widespread use of online systems, there is an increasing focus on maintaining the privacy of individuals and information about them. This is often referred to as a need for privacy protection. The author briefly examines definitions of privacy in this context, roughly delineating between keeping facts private and statistical privacy that deals with what can be inferred from data sets. Many of the mechanisms used to implement what is commonly thought of as access control are the same ones used to protect privacy. This chapter explores when this is not the case and, in general, the interplay between privacy and access control on the one hand and, on the other hand, the separation of these models from mechanisms for their implementation.


2021 ◽  
Vol 48 (4) ◽  
pp. 307-328
Author(s):  
Dominic Farace ◽  
Hélène Prost ◽  
Antonella Zane ◽  
Birger Hjørland ◽  
◽  
...  

This article presents and discusses different kinds of data documents, including data sets, data studies, data papers and data journals. It provides descriptive and bibliometric data on different kinds of data documents and discusses the theoretical and philosophical problems by classifying documents according to the DIKW model (data documents, information documents, knowl­edge documents and wisdom documents). Data documents are, on the one hand, an established category today, even with its own data citation index (DCI). On the other hand, data documents have blurred boundaries in relation to other kinds of documents and seem sometimes to be understood from the problematic philosophical assumption that a datum can be understood as “a single, fixed truth, valid for everyone, everywhere, at all times”


2010 ◽  
Vol 23 ◽  
pp. 113-117
Author(s):  
A. Orphanou ◽  
K. Nicolaides ◽  
D. Charalambous ◽  
P. Lingis ◽  
S. C. Michaelides

Abstract. In the present study, the monthly statistical characteristics of jetlet and tropopause in relation to the development of thunderstorms over Cyprus are examined. For the needs of the study the 12:00 UTC radiosonde data obtained from the Athalassa station (33.4° E, 35.1° N) for an 11-year period, from 1997 till 2007, were employed. On the basis of this dataset, the height and the temperature of the tropopause, as well as the height, wind direction and speed of the jetlet were estimated. Additionally, the days in the above period with observed thunderstorms were selected and the aforementioned characteristics of the jetlet and tropopause were noted. The two data sets were subsequently contrasted in an attempt to identify possible relations between thunderstorm development, on the one hand, and tropopause and jetlet characteristics, on the other hand.


2021 ◽  
Vol 13 (2) ◽  
pp. 167-190
Author(s):  
Gero Szepannek ◽  
Laila Westphal ◽  
Werner Gronau ◽  
Tine Lehmann

Abstract The article at hand is driven by a methodological interest in the opportunities and challenges of applying an automated text mining approach, particularly a sentiment analysis on various tourism blogs at the same time. The study aims to answer the question to what extent advanced computational methods can improve the data acquisition and analysis of unstructured data sets stemming from various blogs and forums. Furthermore, the authors intend to explore to what extent the sentiment analysis is able to objectify the qualitative results identified by an earlier analysis by the authors using content analysis done by thematic coding. For the purpose of the specific tourism research question in this paper a new approach is proposed, which consists of a combination of sentiment analyses, supervised learning, and dimensionality reduction in order to identify terms that strongly load on specific emotions. The contribution indicates on the one hand, that advanced computational methods have their own specific constraints, but on the other hand, are able to provide a richer and deeper analysis following a quantitative approach. Several issues have to be taken into account, such as data protection constraints, the need for data cleaning, such as word stemming, dimension reduction, such as removal of custom stop words, and the development of descent ontologies. On the other hand, the quantitative method also provides, due to its standardised procedure, a less subjective insight in the given content, but is not less time consuming than traditional content analysis.


Author(s):  
Hiroshi Sakai ◽  
Kao-Yi Shen ◽  
Michinori Nakata ◽  
◽  
◽  
...  

This paper focuses on two Apriori-based rule generators. The first is the rule generator in Prolog and C, and the second is the one in SQL. They are namedApriori in PrologandApriori in SQL, respectively. Each rule generator is based on the Apriori algorithm. However, each rule generator has its own properties. Apriori in Prolog employs the equivalence classes defined by table data sets and follows the framework of rough sets. On the other hand, Apriori in SQL employs a search for rule generation and does not make use of equivalence classes. This paper clarifies the properties of these two rule generators and considers effective applications of each to existing data sets.


Author(s):  
Stefan Krause ◽  
Markus Appel

Abstract. Two experiments examined the influence of stories on recipients’ self-perceptions. Extending prior theory and research, our focus was on assimilation effects (i.e., changes in self-perception in line with a protagonist’s traits) as well as on contrast effects (i.e., changes in self-perception in contrast to a protagonist’s traits). In Experiment 1 ( N = 113), implicit and explicit conscientiousness were assessed after participants read a story about either a diligent or a negligent student. Moderation analyses showed that highly transported participants and participants with lower counterarguing scores assimilate the depicted traits of a story protagonist, as indicated by explicit, self-reported conscientiousness ratings. Participants, who were more critical toward a story (i.e., higher counterarguing) and with a lower degree of transportation, showed contrast effects. In Experiment 2 ( N = 103), we manipulated transportation and counterarguing, but we could not identify an effect on participants’ self-ascribed level of conscientiousness. A mini meta-analysis across both experiments revealed significant positive overall associations between transportation and counterarguing on the one hand and story-consistent self-reported conscientiousness on the other hand.


2005 ◽  
Vol 44 (03) ◽  
pp. 107-117
Author(s):  
R. G. Meyer ◽  
W. Herr ◽  
A. Helisch ◽  
P. Bartenstein ◽  
I. Buchmann

SummaryThe prognosis of patients with acute myeloid leukaemia (AML) has improved considerably by introduction of aggressive consolidation chemotherapy and haematopoietic stem cell transplantation (SCT). Nevertheless, only 20-30% of patients with AML achieve long-term diseasefree survival after SCT. The most common cause of treatment failure is relapse. Additionally, mortality rates are significantly increased by therapy-related causes such as toxicity of chemotherapy and complications of SCT. Including radioimmunotherapies in the treatment of AML and myelodyplastic syndrome (MDS) allows for the achievement of a pronounced antileukaemic effect for the reduction of relapse rates on the one hand. On the other hand, no increase of acute toxicity and later complications should be induced. These effects are important for the primary reduction of tumour cells as well as for the myeloablative conditioning before SCT.This paper provides a systematic and critical review of the currently used radionuclides and immunoconjugates for the treatment of AML and MDS and summarizes the literature on primary tumour cell reductive radioimmunotherapies on the one hand and conditioning radioimmunotherapies before SCT on the other hand.


2003 ◽  
pp. 15-26
Author(s):  
P. Wynarczyk
Keyword(s):  
The Core ◽  

Two aspects of Schumpeter' legacy are analyzed in the article. On the one hand, he can be viewed as the custodian of the neoclassical harvest supplementing to its stock of inherited knowledge. On the other hand, the innovative character of his works is emphasized that allows to consider him a proponent of hetherodoxy. It is stressed that Schumpeter's revolutionary challenge can lead to radical changes in modern economics.


2018 ◽  
Vol 4 (1) ◽  
pp. 67-84
Author(s):  
Wahyudin Noor

Abstract Pesantren are often associated with backwardness and traditionalism in everything: facilities, technology, learning methods, and even the curriculum. For now, it seems like the traditional term for pesantren is no longer relevant enough. The pace of movement in the era of renewal marked by the rapid development of technology has demanded pesantren to make adjustments. However, on the one hand, when viewed from the direction of change, the reform efforts pursued by pesantren are not to erase the old tradition, but merely to add something new so that the old tradition and conditions can be maintained while accepting the presence of a new one. On the other hand, the reform efforts undertaken by pesantren have implications for the fact that the typical values of the pesantren are fading away. Abstrak  Pesantren seringkali diasosiasikan dengan keterbelakangan dan tradisional dalam segala hal: fasilitas, teknologi, metode pembelajaran, dan bahkan kurikulumnya. Untuk saat ini, sepertinya istilah tradisional untuk pesantren, sudah tidak lagi cukup relevan. Laju gerak pembaharuan zaman yang ditandai dengan pesatnya perkembangan teknologi telah menuntut pesantren untuk melakukan penyesuaian diri. Kendatipun demikian, di satu sisi, jika dilihat dari arah perubahan, upaya pembaharuan yang ditempuh pesantren tidaklah untuk menghapus tradisi yang lama, tetapi sekadar menambah dengan sesuatu yang baru sehingga tradisi maupun kondisi yang lama bisa dipertahankan sambil menerima kehadiran yang baru. Di sisi yang lain, upaya pembaharuan yang dilakukan pesantren ternyata berimplikasi pada kenyataan akan semakin pudarnya nilai-nilai khas yang dimiliki oleh pesantren.


Sign in / Sign up

Export Citation Format

Share Document