Academic literature on the topic 'BF. Information policy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'BF. Information policy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "BF. Information policy"

1

Kumar, G. Sravan, and A. Sri Krishna. "Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption." International Journal of Information Security and Privacy 13, no. 4 (October 2019): 12–27. http://dx.doi.org/10.4018/ijisp.2019100102.

Full text
Abstract:
Cloud data storage environments allow the data providers to store and share large amounts of datasets generated from various resources. However, outsourcing private data to a cloud server is insecure without an efficient access control strategy. Thus, it is important to protect the data and privacy of user with a fine-grained access control policy. In this article, a Bloom Filter-based Ciphertext-Policy Attribute-Based Encryption (BF-CP-ABE) technique is presented to provide data security to cloud datasets with a Linear Secret Sharing Structure (LSSS) access policy. This fine-grained access control scheme hides the whole attribute set in the ciphertext, whereas in previous CP-ABE methods, the attributes are partially hidden in the ciphertext which in turn leaks private information about the user. Since the attribute set of the BF-CP-ABE technique is hidden, bloom filters are used to identify the authorized users during data decryption. The BF-CP-ABE technique is designed to be selective secure under an Indistinguishable-Chosen Plaintext attack and the simulation results show that the communication overhead is significantly reduced with the adopted LSSS access policy.
APA, Harvard, Vancouver, ISO, and other styles
2

Faradilah, Andi, Andi Musafir Rusyaidi, Syatirah Jalaluddin, and Ary I. Savitri. "Breastfeeding Duration More than 18 Months Possibly Lowers the Risk of Language Development Delay in Children Aged 18–35 Months." Kesmas: Jurnal Kesehatan Masyarakat Nasional 17, no. 4 (November 30, 2022): 243. http://dx.doi.org/10.21109/kesmas.v17i4.6218.

Full text
Abstract:
Studies have demonstrated the benefits of breastfeeding (BF) on children’s cognitive function and language development. However, most cognitive and language tools used in these studies have limited ability to identify children’s language development delays. The Language Development Survey (LDS) is expected to provide detailed information on children’s language development. This study aimed to examine the association between BF duration and children’s LDS. A questionnaire was administered to 286 BF mothers to obtain information on their BF duration, and LDS was employed to assess children’s language development. Language delays were detected in 91 (31.8%) children (LDS-vocabulary) and 35.7% children (LDS-phrase). This study also found that children who were breastfed for ≤6 months and 7–18 months had an adjusted OR (AOR) of 0.86 of LDS-vocabulary, and 0.8 of LDS-phrase, whereas children who were breastfed for >18 months had AOR’s LDS-vocabulary of 0.57 and LDS-phrase of 0.46. This study found no significant association between BF duration and LDS score. Nevertheless, BF duration of >18 months possibly lowers the risk of children’s language development delay. More studies are required to investigate this observation’s relationship with children’s language development.
APA, Harvard, Vancouver, ISO, and other styles
3

Hernández-Cordero, Sonia, Mireya Vilar-Compte, Kathrin Litwan, Vania Lara-Mejía, Natalia Rovelo-Velázquez, Mónica Ancira-Moreno, Matthias Sachse-Aguilera, and Fernanda Cobo-Armijo. "Implementation of Breastfeeding Policies at Workplace in Mexico: Analysis of Context Using a Realist Approach." International Journal of Environmental Research and Public Health 19, no. 4 (February 17, 2022): 2315. http://dx.doi.org/10.3390/ijerph19042315.

Full text
Abstract:
Return to work is one of the most significant barriers to breastfeeding (BF). Family-friendly policies are critical to ensure that BF and maternal work are not mutually exclusive. This study aims to determine contextual factors and underlying mechanisms influencing the implementation of workplace policies in Mexico. Following a qualitative approach, the study was conducted in the following four cities in Mexico: Mérida, Chihuahua, Guadalajara, and Monterrey. Interviews were conducted in 14 workplaces, and included 49 (potential) beneficiaries, 41 male employees, and 21 managers and human resources personnel. The information collected was analyzed through a deductive thematic analysis and mapped against the Context-Mechanism-Outcome framework of Breastfeeding Interventions at the Workplace. Contextual factors influencing a BF-friendly environment in the workplace were as follows: work-schedule flexibility, provision of lactation services (i.e., BF counseling) other than a lactation room, women’s previous experience with BF and family-friendly environments in the workplace. The underlying mechanisms enabling/impeding a BF-friendly environment at the workplace were as follows: awareness of Mexican maternity protection legislation, usage of BF interventions in the workplace, culture, supervisor/co-worker support and BF-friendly physical space. To achieve a BF-friendly environment in the workplace, actions at the level of public policy and workplaces must accompany adherence to Mexican legislation.
APA, Harvard, Vancouver, ISO, and other styles
4

So, Billy C. L., Manny M. Y. Kwok, Nakita W. L. Lee, Andy W. C. Lam, Anson L. M. Lau, Allen S. L. Lam, Phoebe W. Y. Chan, and Shamay S. M. Ng. "Lower Limb Muscles’ Activation during Ascending and Descending a Single Step-Up Movement: Comparison between In water and On land Exercise at Different Step Cadences in Young Injury-Free Adults." Healthcare 11, no. 3 (February 3, 2023): 441. http://dx.doi.org/10.3390/healthcare11030441.

Full text
Abstract:
(1) Background: Forward step-up (FSU) simulates the stance phase in stair ascension. With the benefits of physical properties of water, aquatic FSU exercise may be more suitable for patients with lower limb weakness or pain. The purpose of this study is to investigate the effect of progressive steps per min on the surface electromyography (sEMG) of gluteus maximus (GM), biceps femoris (BF), rectus femoris (RF), and gastrocnemius (GA), when performing FSU exercise with different steps per min in water and on land. (2) Methods: Participants (N = 20) were instructed to perform FSU exercises at different steps per min (35, 60, and 95 bpm) in water and on land. The sEMG of the tested muscles were collected. The percentage maximum voluntary isometric contraction (%MVIC) of GM, RF, GA and BF at different environments and steps per min was compared. (3) Result: There was a statistically significant difference of %MVIC of RF at all steps per min comparisons regardless of the movement phases and environments (p < 0.01, except for descending phases of 35 bpm vs. 60 bpm). All tested muscles showed a statistically significant lower muscle activation in water (p < 0.05) (4) Conclusion: This study found that the %MVIC of the tested muscle in both investigated environments increase as steps per minute increases. It is also found that the movement pattern of FSU exercise activates RF the most among all the tested muscles. Muscle activation of all tested muscles is also found to be smaller in water due to buoyancy property of water. Aquatic FSU exercise might be applicable to patients with lower limb weakness or knee osteoarthritis to improve their lower limb strength.
APA, Harvard, Vancouver, ISO, and other styles
5

Kang, Seoungki, Jeong-Hui Park, Myong-Won Seo, Hyun Chul Jung, Yong Ik Kim, and Jung-Min Lee. "Validity of the Portable Ultrasound BodyMetrix™ BX-2000 for Measuring Body Fat Percentage." Sustainability 12, no. 21 (October 22, 2020): 8786. http://dx.doi.org/10.3390/su12218786.

Full text
Abstract:
BodyMetrix™ BX-2000 (IntelaMetrix, Livermore, CA, USA) has been introduced as one of the alternatives and portable methods to estimate body fat percentage. However, inconsistent results between protocols built-in the BodymetrixTM may be compelling the question of its validity. Thus, this study first investigated the possible errors between protocols and evaluated the validity of body fat percentage (BF%) compared to the gold standard method (dual-energy X-ray absorptiometry, DEXA). One hundred and five collegiate males, aged 20.01 ± 2.11 years, body height, 174.81 ± 6.01 cm, body mass, 73.26 ± 13.60 kg, and body mass index, 23.91 ± 3.77 kg·m−2 participated in the present study. Participants’ body fat percentage was estimated by built-in nine different protocols in the BodyMetrix™ BX-2000 using A-MODE ultrasound. Pearson correlation (r), Mean absolute percentage errors (MAPEs), Bland & Altman plots, and Equivalence testing were used to examine the validity of each protocol by comparing it to the criterion measure (i.e., DEXA). The results indicated good potential for almost all of the protocols in correlation (Min: r = 0.79, Max: r = 0.92)., MAPEs (Min: 20.0%, Max: 33.8%), and Bland-Altman (Min diff: 16.7, Max diff: 41.4). Particularly, the estimated BF% from protocol 7 (4-sites by Durnin & Wormersley) and protocol 9 (9-sites Parllo) were completed within the equivalence zone (±10% of the mean). The estimates measured by protocol 7 and protocol 9 identified as the most valid methods for estimating BF% using a BodyMetrix™ BX-2000, compared to the DEXA. Our findings provide valuable information when applying in young male individuals, but future studies with other populations such as female or adolescents may be required to suggest a valid protocol within the instrument.
APA, Harvard, Vancouver, ISO, and other styles
6

Nechuta, Sarah J., Jenna Moses, Molly Golladay, Adele Lewis, Julia Goodin, and Melissa McPheeters. "Improving risk factor identification for opioid overdose deaths in Tennessee." Online Journal of Public Health Informatics 11, no. 1 (May 30, 2019). http://dx.doi.org/10.5210/ojphi.v11i1.9925.

Full text
Abstract:
ObjectiveTo examine specific drugs present based on postmortem toxicology for prescription opioid, heroin, and fentanyl overdoses classified based on ICD-10 coding. To compare drugs identified from postmortem toxicology with those listed on the death certificate for opioid overdoses.IntroductionUsing death certificates alone to identify contributing substances in drug overdose deaths may result in misclassification and underestimation of the burden of illicit and prescription opioids and other drugs in drug-related deaths. To enable timely and targeted prevention in Tennessee (TN), the identification and monitoring of new drugs and trends in use should utilize toxicology and medicolegal death investigation data directly, as recommended by others 1-3. These data can inform mortality outcome definitions for improved surveillance and risk factor identification 4-7. To our knowledge, this is the first analysis to use statewide linked toxicology and death certificate data in TN.MethodsWe identified 615 opioid involved overdose deaths in TN of unintentional (underlying ICD-10 codes: X40-X44) or undetermined (underlying ICD-10 codes: Y10-Y14) intent during June 1st to December 31st 2017. Utilizing the Interim Medical Examiner Database (I-MED), we identified postmortem toxicology reports for 454 cases, which were from one of three national laboratories used by a state Regional Forensic Center. Toxicology data were abstracted and independently verified by two co-authors and linked to the TN death statistical file that included cause of death information (literal text and ICD-10 codes) and demographics. The analysis focuses on cases with an available toxicology report.ResultsWe identified 171 prescription opioid overdoses, 221 fentanyl overdoses, and 113 heroin overdoses. Table 1 displays postmortem toxicology profiles for major drugs/classes. For prescription opioid deaths (excluding fentanyl and heroin), positive toxicology results for prescription opioids were as follows: methadone (11%), buprenorphine (14%), hydrocodone (14%), oxycodone (36%) and oxymorphone (also a metabolite, 47%). Benzodiazepines were present in close to 58% of prescription opioid overdoses; stimulants (cocaine, amphetamines, methamphetamines) in about 25%. For fentanyl and heroin deaths, prescription opioids were detected in about 26% and 34%, respectively; stimulants in about 57.9% and 52.2%, respectively, and benzodiazepines 36-37%. Fentanyl was present on toxicology in about half of heroin overdoses, and 6–monoacetylmorphine in 72.6%.ConclusionsUsing medical examiners’ data, including toxicology data, improves estimation of contributing drugs involved in opioid deaths. This analysis provides jurisdiction-specific data on drugs that can help with monitoring trends and informs risk factor identification. Future work includes adding information on prescribed opioid and benzodiazepines using TN’s Prescription Drug Monitoring Database and evaluating demographic variation in contributing drugs between toxicology and DC data to identify susceptible populations.References1. Slavova S, O'Brien DB, Creppage K, Dao D, Fondario A, Haile E, Hume B, Largo TW, Nguyen C, Sabel JC, Wright D, Council of S, Territorial Epidemiologists Overdose S. Drug Overdose Deaths: Let's Get Specific. Public Health Rep.2. Horon IL, Singal P, Fowler DR, Sharfstein JM. Standard Death Certificates Versus Enhanced Surveillance to Identify Heroin Overdose-Related Deaths. Am J Public Health. 2018;108(6):777-81.3. Mertz KJ, Janssen JK, Williams KE. Underrepresentation of heroin involvement in unintentional drug overdose deaths in Allegheny County, PA. J Forensic Sci. 2014;59(6):1583-5.4. Landen MG, Castle S, Nolte KB, Gonzales M, Escobedo LG, Chatterjee BF, Johnson K, Sewell CM. Methodological issues in the surveillance of poisoning, illicit drug overdose, and heroin overdose deaths in new Mexico. Am J Epidemiol. 2003;157(3):273-8.5. Davis GG, National Association of Medical E, American College of Medical Toxicology Expert Panel on E, Reporting Opioid D. Complete republication: National Association of Medical Examiners position paper: Recommendations for the investigation, diagnosis, and certification of deaths related to opioid drugs. J Med Toxicol. 2014;10(1):100-6.6. Slavova S, Bunn TL, Hargrove SL, Corey T. Linking Death Certificates, Postmortem Toxicology, and Prescription History Data for Better Identification of Populations at Increased Risk for Drug Intoxication Deaths. Pharmaceutical Medicine. 2017;31(3):155-65.7. Hurstak E, Rowe C, Turner C, Behar E, Cabugao R, Lemos NP, Burke C, Coffin P. Using medical examiner case narratives to improve opioid overdose surveillance. Int J Drug Policy. 2018;54:35-42.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "BF. Information policy"

1

Becerra, Martín Alfredo. "El progreso con peajes: la sociedad de la información. Acceso y convergencia a partir del proyecto europeo." Doctoral thesis, Universitat Autònoma de Barcelona, 2001. http://hdl.handle.net/10803/4165.

Full text
Abstract:
El trabajo de tesis estudia la conformación de diferentes niveles de accesos sociales y comunicativos en el marco del proyecto de Sociedad d ella Información, haciendo hincapié en las políticas europeas y contrastándolas con indicadores socioeconómicos y con las directrices que, sobre el mismo proyecto, formulan países latinoamericanos.
La tesis doctoral elucida los procesos de concentración y convergencia de industrias de la comunicación y la información, como procesos críticos de un abordaje analítico enmarcado en los estudios de economía política de la comunicación.
La construcción de un modo de desarrollo en el que aparecen las tecnologías de información y comunicación como elementos centrales (centralidad que se verifica en la estructuración de las sociedades nombradas como "informacionales") es parte medular de la tesis doctoral, que también presenta el análisis de contenido de los principales documentos de la Comisión Europea y de la Organización para la Cooperación y el Desarrollo Económico (OCDE) en la última década del Siglo XX.
The thesis object is to study the different levels of social and communicative access with the Information Society as a framework. Thus, the thesis empathises the european policies of the Information Society project, and the thesis work contrasts this policies with socioeconomic indicators, as well as the main directives of Latin American countries in the same field.
The thesis focuses on the concentration and convergence processes localised at the information and communication industries, due to the critical impact of these two processes in the economic structure of contemporaneous societies.
The conceptual framework of the thesis is linked to the political economy of communications studies. The thesis also presents the content analysis of the main documents produced by the European Commission and the OECD.
APA, Harvard, Vancouver, ISO, and other styles
2

Bargmann, Monika. "Das österreichische Rechtsinformationssystem im Spannungsfeld von privatem und öffentlichem Interesse." Thesis, 2002. http://eprints.rclis.org/6392/1/bargmann_diplomarbeit_ris.pdf.

Full text
Abstract:
Access to "public sector information" is a broadly discussed topic at the moment, as current publications like the "green book on public sector information in the information society" compiled by the European Union and a number of recent conferences dealing with this topic show. Legal information plays a special role within this field, as it is the prerequisite to obeying the law and to exercising one's rights and duties as a citizen. The paper deals with the Austrian legal information system "Rechtsinformationssystem" (RIS) as an example of public sector information and its commercial opponent "Rechtsdatenbank" (RDB). It uses data gathered by a literature review and interviews with experts. One member of a non-governmental organization, one representative of the federal agency providing the RIS, the head of a group representing the information industry's interests, a representative of the Austrian bar association and the managing director of the RDB, a Vienna-based company selling legal information, were consulted. The dissertation has sought arguments that support or vitiate the following hypotheses: 1. Non-restrictive access to legal information is necessary for legal and democratic/political reasons. 2. The existing Austrian legal information system "RIS" has to be complemented by legal advise supplied by qualified persons familiar with law and jurisdiction. 3. Free-of-charge basic information, provided by the government, and commercial added-value services can coexist – under certain circumstances. Supporting arguments for the hypotheses 1 and 2 could be found. The assessment of the third hypothesis depends on current market developments and cannot be undertaken yet.
APA, Harvard, Vancouver, ISO, and other styles
3

Larnhof, Karin. "Data retention : zur aktuellen Rechtslage in einigen ausgewählten EU-Mitgliedsländern unter Berücksichtigung der EU-Richtlinie zur Vorratsdatenspeicherung." Thesis, 2006. http://eprints.rclis.org/7871/1/AC05370273.pdf.

Full text
Abstract:
In December 2005 the European Parliament passed a directive about Data Retention that obliges every member state to save all connection data for six to 24 months. By using telecommunication services connection data occur and it is normally used for billing and for offering value-added services. The aim of this thesis is to analyse this EU-guideline and compare it with the current legal position in Austria and in the European Union. The hypothesis is tested, that the directive will have competitive disadvantages for small and medium-sized businesses and that it will have a massive influence on the privacy of the users. A review of current literature on this topic is undertaken. Then four with experts on this subject gave guided interviews. The questionnaire for this interviews covers issues regarding details of the guideline, security aspects, the conversion to Austrian legislation and problems that could occur. It was found that the directive is formulated vague and important fields are not covered. The expenses arising at the provider for saving the connection data or for implementing security provisions can be covered by the member states, but they are not obliged to. Moreover some of the specifications of the EU-directive cannot be realised for technical purposes. The findings show that Data Retention is a very controversial subject, being advocated by privacy experts and providers of telephony and Internet and endorsed by law enforcement agencies. Furthermore problems will occur converting the EU-directive to national legislation because of the problems mentioned in the paper. Therefore the European Parliament will have to revise the directive and decide on a new adapted directive.
APA, Harvard, Vancouver, ISO, and other styles
4

SANTOS, José Carlos Sales dos. "Informação pública e participação política em rede: uma análise da governança eletrônica nos websites dos deputados do Estado da Bahia." Thesis, 2011. http://eprints.rclis.org/16375/1/Vers%C3%A3o%20Final%20-%20Disserta%C3%A7%C3%A3o%20Jos%C3%A9%20Carlos%20Sales.pdf.

Full text
Abstract:
The Internet, together with information technology, has interfered in the public sector and civil society, becoming an object of speculation in the political field. With the potential of interactivity and network sharing, governments seek to provide individuals with different media to have access to government information in order to solve the deficit of political participation of individuals - an important initiative to consolidate the democratic process. Based on the central role of information technology in the political arena to achieve informational content and political participation in the network, this research investigated how the websites of the Members of the legislative Assembly of Bahia - ALBA affect political participation, using interactive channels for the achievement of public information network. As its main goal was to analyze the conditions for political participation in parliamentary sites, the secondary objectives of profiling activities corresponded to the websites of members registered at the corporate website of ALBA; identify potential instruments with these websites and interactive simulations aimed to describe the devices identified in these interactive sites for the achievement of public informational content. The section devoted to the theoretical framework, however, sought grants essential to answer the question of departure and the base mesh argumentative research, and methodological procedures in the section was outlined the scope of the search. The method of approach was the dialectical (historical materialism) of Marx and Engels, and the method of procedure was based on the monograph (case study). As descriptive research, the researcher sought to describe the characteristics of the websites of Members (population or phenomenon), including the methodological section the techniques and instruments for data collection (observation, interviews and search form). The subsequent sections gave the presentation and analysis of data collected for, on completion, provide the ultimate research considerations. The conclusion showed that the availability of device-oriented websites interactivity between government officials and citizens do not represent that the demands are answered and suggestions effect the political platform of Members. The research confirmed that these sites, and as a result, Members and Counseling, presented no evidence of structural and administrative offices to meet the demands or suggestions from citizens.
APA, Harvard, Vancouver, ISO, and other styles
5

Gauchi, Verónica. "Tutela jurídica del patrimonio documental en la legislación sudamericana." Thesis, 2010. http://eprints.rclis.org/17589/1/GauchiV%20Tutela%20juridica%20del%20patrimonio%20documental%20en%20la%20legislaci%C3%B3n%20sudamericana%20UIA%20pdf.pdf.

Full text
Abstract:
Without memory there is no transmission of knowledge and without this it would not be possible the permanence of the institutions of a society. In recent years modern states have become conscious of its role for action in cultural development and therefore have assumed the responsibility for cultural policy. The evolution of this thinking led to the establishment of a new legal category: the cultural heritage, which is inalienable, indefeasible, and imprescriptible. Our goal is to establish the legal framework of fundamental rights and processes of constitutionalisation and internationalization to realize the historical and legal scope in which documentary heritage becomes a fundamental and protected right. Documentary heritage, has its foundation in the consideration as a inseparable right from the nation that has been generated, indispensable to for it knowledge and his own identificatio, and in this respect the most recent reforms of the South American Constitutions have been included and given a significant role to the State in matters of defense of documentary heritage.
APA, Harvard, Vancouver, ISO, and other styles
6

SILVA, Edilene. "A influência das políticas de informação científica e tecnológica para as bibliotecas universitárias." Thesis, 2009. http://eprints.rclis.org/14433/1/Disserta%C3%A7%C3%A3o_CI_-EDILENE_MARIA_DA_SILVA.pdf.

Full text
Abstract:
This research retakes the discussion on scientific and technological information policies (STI) in Brazil, focusing the academic libraries subsystem of federal universities. The 1980s were chosen, as time description, for presenting the confluence of political and institutional factors favorable to the elaboration of the Academic Libraries National Plan (ALNP) into the context of public policies of Science and Technology (S&T). The theoretical-conceptual background presents several definitions of STI policies, its interlacements to other policies and the difficulty to define what policy is due to the complexity of the subject’s nature of this policy: “information”. This research brings a frame which emphasizes the historicity of STI and academic libraries in Brazil, reviewing the political moments which were decisive to continue or not the government plans and programs. It was used the General Theory of Systems, what makes the policy be understood through the systemic point of view, that is, as a group of coordinated parts, forming a complex or unitary whole with common goals. This study’s goal was to analyze the STI micro-policies influence to the macro-policies formulation and the conditions in which it happens. For that, the analysis was accomplished in two stages: the survey of documents of S&T and STI plans and programs; and interviews with professionals who participated in the discussion and elaboration of such documents in the 1980s. It is concluded that the social, political and institutional conditions which provided the current situation of STI and academic libraries are results of human action. And only through the action of competent professionals, who are committed to proportionate necessary changes, it will be possible to change this situation, making possible the favorable conditions to the elaboration of a STI public policy.
APA, Harvard, Vancouver, ISO, and other styles
7

Silva, Edilene. "A influência das políticas de informação científica e tecnológica para as bibliotecas universitárias." Thesis, 2009. http://eprints.rclis.org/14434/1/Disserta%C3%A7%C3%A3o_CI_-EDILENE_MARIA_DA_SILVA.pdf.

Full text
Abstract:
This research retakes the discussion on scientific and technological information policies (STI) in Brazil, focusing the academic libraries subsystem of federal universities. The 1980s were chosen, as time description, for presenting the confluence of political and institutional factors favorable to the elaboration of the Academic Libraries National Plan (ALNP) into the context of public policies of Science and Technology (S&T). The theoretical-conceptual background presents several definitions of STI policies, its interlacements to other policies and the difficulty to define what policy is due to the complexity of the subject’s nature of this policy: “information”. This research brings a frame which emphasizes the historicity of STI and academic libraries in Brazil, reviewing the political moments which were decisive to continue or not the government plans and programs. It was used the General Theory of Systems, what makes the policy be understood through the systemic point of view, that is, as a group of coordinated parts, forming a complex or unitary whole with common goals. This study’s goal was to analyze the STI micro-policies influence to the macro-policies formulation and the conditions in which it happens. For that, the analysis was accomplished in two stages: the survey of documents of S&T and STI plans and programs; and interviews with professionals who participated in the discussion and elaboration of such documents in the 1980s. It is concluded that the social, political and institutional conditions which provided the current situation of STI and academic libraries are results of human action. And only through the action of competent professionals, who are committed to proportionate necessary changes, it will be possible to change this situation, making possible the favorable conditions to the elaboration of a STI public policy.
APA, Harvard, Vancouver, ISO, and other styles
8

Vera-Baceta, Miguel-Ángel. "Ley de Transparencia: La apertura de datos en entidades externas a la Administración Pública." Thesis, 2014. http://eprints.rclis.org/24742/1/219501-775931-1-PB.pdf.

Full text
Abstract:
The Transparency Act, public access to information and good government is a reality in Spain. While its entry into force, in relation to transparency and access to public information, contemplates a lack of one to two years, the organizations concerned should be prepared to meet its requirements. The purpose of this paper is to present the state of the question regarding the implications of the Transparency Act in information management on organizations outside the Public Administration and proposes an opening data model as a guide for its adaptation and integration.
APA, Harvard, Vancouver, ISO, and other styles
9

Nascimento, Andrade de Lima do. "Direito a informação e direitos sociais no contexto do capitalismo contemporâneo." Thesis, 2007. http://eprints.rclis.org/25667/1/Direito%20a%20Informacao%20e%20Direitos%20Sociais_0.pdf.

Full text
Abstract:
This bibliographic research analyses the right to information in the context of social rights and the manner in which the right to information is capable of contributing to the acquisition of social rights in the era of capitalism. Information and knowledge are defined as a social phenomenon that is defined by, as well as defines, various social processes. The social value attributed to information and its effectiveness in the creation of opportunities for change determine the correlation between the right to information and social rights due to the potential of information to contribute the establishment of opportunities for autonomy and processes of participation among others. This research comprehends the right to information as a symbolic recourse that reproduces and represents the actualization of information as a facilitator and mediator of social relations that are of an informative nature. As such this research analyses the relationship between information and capitalism based on three interconnected thematically articulated topics: the genesis of the relationship between capitalism and information based upon the concept of the technological revolution as explained by Mandel (1985); the effects and impact of technological information and communication on social processes; and the emergence of the information based society as political strategy to maintain the hegemony of capitalistic interests. This relationship is characterized in terms of its capitalistic based appropriation of information and subsequent aggravation of social inequality. This research also perceives the social State as information based State that provides for individual or collective information based demands. Local authority is also analyzed as means of informational based governance and as a means of satisfying the informational and communication based needs of a society as a strategy to legitimize the right to and form of information presented to civil society. Social control is considered as a mechanism to: establish the effective management and socialization of local information based upon the right to information; establish channels of participation for civil society in a regime that is based upon and that promotes informational based governance.
APA, Harvard, Vancouver, ISO, and other styles
10

Prieto, Gutiérrez Juan José. "Protección de datos en la biblioteca de la Universidad Complutense." Thesis, 2006. http://eprints.rclis.org/10969/1/PROTECCION_DE_DATOS_EN_LA_BIBLIOTECA_DE_LA_UNIVERSIDAD_COMPLUTENSE_DE_MADRID.pdf.

Full text
Abstract:
The object of the thesis is to give an overview of Data Protection at the library of the Universidad Complutense (Madrid). The sources of this work include legislation, polls of workers and users, monographs and articles. It concludes the need for creating a code of conduct for the rigorous treatment of personal information to guarantee confidentiality and protecting users' privacy.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "BF. Information policy"

1

Kumar, G. Sravan, and A. Sri Krishna. "Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption." In Research Anthology on Artificial Intelligence Applications in Security, 1431–47. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch064.

Full text
Abstract:
Cloud data storage environments allow the data providers to store and share large amounts of datasets generated from various resources. However, outsourcing private data to a cloud server is insecure without an efficient access control strategy. Thus, it is important to protect the data and privacy of user with a fine-grained access control policy. In this article, a Bloom Filter-based Ciphertext-Policy Attribute-Based Encryption (BF-CP-ABE) technique is presented to provide data security to cloud datasets with a Linear Secret Sharing Structure (LSSS) access policy. This fine-grained access control scheme hides the whole attribute set in the ciphertext, whereas in previous CP-ABE methods, the attributes are partially hidden in the ciphertext which in turn leaks private information about the user. Since the attribute set of the BF-CP-ABE technique is hidden, bloom filters are used to identify the authorized users during data decryption. The BF-CP-ABE technique is designed to be selective secure under an Indistinguishable-Chosen Plaintext attack and the simulation results show that the communication overhead is significantly reduced with the adopted LSSS access policy.
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, G. Sravan, and A. Sri Krishna. "Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption." In Research Anthology on Artificial Intelligence Applications in Security, 1431–47. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch064.

Full text
Abstract:
Cloud data storage environments allow the data providers to store and share large amounts of datasets generated from various resources. However, outsourcing private data to a cloud server is insecure without an efficient access control strategy. Thus, it is important to protect the data and privacy of user with a fine-grained access control policy. In this article, a Bloom Filter-based Ciphertext-Policy Attribute-Based Encryption (BF-CP-ABE) technique is presented to provide data security to cloud datasets with a Linear Secret Sharing Structure (LSSS) access policy. This fine-grained access control scheme hides the whole attribute set in the ciphertext, whereas in previous CP-ABE methods, the attributes are partially hidden in the ciphertext which in turn leaks private information about the user. Since the attribute set of the BF-CP-ABE technique is hidden, bloom filters are used to identify the authorized users during data decryption. The BF-CP-ABE technique is designed to be selective secure under an Indistinguishable-Chosen Plaintext attack and the simulation results show that the communication overhead is significantly reduced with the adopted LSSS access policy.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography