data broker
Recently Published Documents


TOTAL DOCUMENTS

26
(FIVE YEARS 15)

H-INDEX

5
(FIVE YEARS 1)

Author(s):  
Carole Faviez ◽  
Pierre Foulquié ◽  
Xiaoyi Chen ◽  
Adel Mebarki ◽  
Sophie Quennelle ◽  
...  

The exhaustive automatic detection of symptoms in social media posts is made difficult by the presence of colloquial expressions, misspellings and inflected forms of words. The detection of self-reported symptoms is of major importance for emergent diseases like the Covid-19. In this study, we aimed to (1) develop an algorithm based on fuzzy matching to detect symptoms in tweets, (2) establish a comprehensive list of Covid-19-related symptoms and (3) evaluate the fuzzy matching for Covid-19-related symptom detection in French tweets. The Covid-19-related symptom list was built based on the aggregation of different data sources. French Covid-19-related tweets were automatically extracted using a dedicated data broker during the first wave of the pandemic in France. The fuzzy matching parameters were finetuned using all symptoms from MedDRA and then evaluated on a subset of 5000 Covid-19-related tweets in French for the detection of symptoms from our Covid-19-related list. The fuzzy matching improved the detection by the addition of 42% more correct matches with an 81% precision.


Author(s):  
James Wright

Voice controlled virtual assistants, delivered via consumer devices such as smart speakers and tablets, are being trialled by local authorities across England as a convenient and low-cost supplement or potential alternative to “traditional” telecare. Few papers have explored this increasingly widespread phenomenon, despite its growing importance. This article looks at choices by some local authorities to trial Alexa, within the context of the ongoing care crisis in England, with councils facing depleted funds, a lack of expert guidance on care technologies, and an increasingly complex and fragmented care technology marketplace. It draws on interviews with managers from eight English local authorities involved in the commissioning and trialling of technologies for adult social care to examine how and why virtual assistants are being implemented, and what implications their use might hold for care. Scaling up the application of such technologies could shift the role of local authorities towards one of an app developer and data broker, while generating considerable risks of reliance on the precarious technological infrastructure of global corporations that may have little interest in or sensitivity towards local care concerns. The findings suggest an urgent need for a national social care technology strategy and increased support for local authorities.


Author(s):  
Tawei Wang ◽  
Yen-Yao Wang

This chapter provides an overview of several recently proposed or passed privacy-related regulations, including General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Illinois Video Interview Act, Data Broker Regulations in Vermont, and Privacy Bill of Rights Act, and related but very limited studies. Toward the end, several research opportunities are discussed. These research opportunities include (1) economic consequences of these new regulations and (2) the new research framework to capture novel features of these regulations to explain security compliance. The authors further discuss possible research designs to address the proposed research opportunities. This chapter provides both professionals and researchers additional insights on the regulation of privacy issues.


Author(s):  
Tawei Wang ◽  
Yen-Yao Wang

This chapter provides an overview of several recently proposed or passed privacy-related regulations, including General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Illinois Video Interview Act, Data Broker Regulations in Vermont, and Privacy Bill of Rights Act, and related but very limited studies. Toward the end, several research opportunities are discussed. These research opportunities include (1) economic consequences of these new regulations and (2) the new research framework to capture novel features of these regulations to explain security compliance. The authors further discuss possible research designs to address the proposed research opportunities. This chapter provides both professionals and researchers additional insights on the regulation of privacy issues.


KOMTEKINFO ◽  
2020 ◽  
Vol 7 (4) ◽  
pp. 270-277
Author(s):  
Hendra ◽  
Andhika

Feeding fish is the most important thing in raising fish, with regular feeding to fish the fish will be able to continue to breed, In general, the process of feeding still requires human resources that are still manual, so that it will be difficult and disrupt human activity itself, if the process carried out must spread the food in the aquarium when someone is not in place, Therefore, currently IOT (Internet of Thing) technology has been developed which can facilitate human activities with remote control systems. The process of feeding with a remote control system is done using android, so as to simplify and save someone's time in the process of feeding without having to be in place. The control system used is Arduino ESP8266 as a single board micro controller platform, so that the control device can function to connect the WI-FI network. The process of connecting an Arduino ESP8266 device with a smartphone is done using the broker as hosting, the broker used was MQTT (Message Queuing Telemetry Transport), MQTT is a protocol that runs on the TCP / IP stack and is designed specifically for machine to machine that does not have a specific address. MQTT broker's working system is to implement publish as data sender, subcribe as data recipient, and topic as hosting data broker.


Author(s):  
Emmanuel Benoist ◽  
Jan Sliwa

Smart, networked medical devices play a rapidly growing role in healthcare. Those devices and their data have to be integrated into the healthcare system. There are several reasons to reuse those data for well-defined purposes by well-defined partners; this reuse should be controlled by the patient and not depend on the manufacturer infrastructure. Different stakeholders have an understandable reason to access those data under the control of the patient. The authors propose an architecture of a decentralized data broker that receives the data streams from the devices and redistributes them securely to legitimate recipients. This broker is based on the peer-to-peer network Freenet. This network has been defined to be censorship resistant and to protect the privacy of persons sharing data. This covers the needs for protection expected from a secure data broker. The patient can directly define which of the stakeholders will receive which information and the information is encrypted in a way that only that partner can read it.


Sign in / Sign up

Export Citation Format

Share Document