Academic literature on the topic 'Computers – Access control – Great Britain'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computers – Access control – Great Britain.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computers – Access control – Great Britain"

1

Battier, Marc. "Between Computer Automation, Voltage Control and Literature: A portrait of Peter Zinovieff." Organised Sound 26, no. 3 (December 2021): 413–18. http://dx.doi.org/10.1017/s1355771821000492.

Full text
Abstract:
The life and times of Peter Zinovieff (1933–2021) have been amply commented upon and there are numerous testimonies of his role on developing electronic music as well as his strong impact on musicians throughout the 1970s. However, besides his important role in developing synthesisers, sound processing and various other devices, he is now recognised as a significant pioneer in music with computers. His collaboration with Harrison Birtwistle’s opera The Mask of Orpheus has been deemed an important contribution to contemporary music in Great Britain. Finally, his late return to composition and performance shows his lifelong attachment to innovation and experimentation in music.
APA, Harvard, Vancouver, ISO, and other styles
2

Bolshakov, A. "Regulatory Autonomy of Great Britain: Problems and Perspectives." World Economy and International Relations 65, no. 7 (2021): 71–79. http://dx.doi.org/10.20542/0131-2227-2021-65-7-71-79.

Full text
Abstract:
Sovereignty does not imply regulatory autonomy. After Brexit, the UK should align its regulatory policy with European norms, if it is interested in close partnership with the EU. Compromises must be made by both sides in order to ensure stability of the partnership. The EU will have to acknowledge the UK’s right to diverge from European rules. Britain will have to partly accept the jurisdiction of the European Court of Justice. The structure of dispute settlement mechanism which will be created under the partnership agreement should be a product of a compromise. The present study shows that optimal structure of dispute settlement mechanism must include two different procedures: one for political issues and the other for commercial issues. The central role for the European Court of Justice must be envisaged as a part of politically oriented procedure. There must be no role for the European Court of Justice or any Union to set the pace of political communication. The latter reflects the interest of Great Britain to simplify economic relations, which means that, firstly, disputes are resolved by independent arbiters; secondly, the EU acknowledges the UK’s right to diverge from European regulations; and thirdly, the UK accepts the EU’s right to impose countervailing duties to compensate for adverse effects of divergence on competition. This article also examines the main problems of future British regulatory policy, especially in the field of state aid. Boris Johnson’s government has decided not to form a full-fledged regulatory regime in the area of state aid. Its stance is politically appropriate since Conservative party manifesto for the 2019 general election promised to support local industries without limitations. But that decision created a great deal of economic risk. Firstly, the absence of a domestic subsidy control regulator can cause chaos within regulation system because workable norms and rules can only be sustained by a tight enforcement mechanism. Secondly, the EU can cite lack of subsidy control as an obstacle for British business to have unrestricted access to the European market.
APA, Harvard, Vancouver, ISO, and other styles
3

Makukh-Fedorkova, Ivanna. "The Role of Cinema in the History of Media Education in Canada." Mediaforum : Analytics, Forecasts, Information Management, no. 7 (December 23, 2019): 221–34. http://dx.doi.org/10.31861/mediaforum.2019.7.221-234.

Full text
Abstract:
The era of audiovisual culture began more than a hundred years ago with the advent of cinema, and is associated with a special language that underlies non-verbal communication processes. Today, screen influence on humans is dominant, as the generation for which computer is an integral part of everyday life has grown. In recent years, non-verbal language around the world has been a major tool in the fight for influence over human consciousness and intelligence. Formation of basic concepts of media education, which later developed into an international pedagogical movement, in a number of western countries (Great Britain, France, Germany) began in the 60’s and 70’s of the XX century. In Canada, as in most highly developed countries (USA, UK, France, Australia), the history of media education began to emerge from cinematographic material. The concept of screen education was formed by the British Society for Education in Film (SEFT), initiated by a group of enthusiastic educators in 1950. In the second half of the twentieth century, due to the intensive development of television, the initial term “film teaching” was transformed into “screen education”. The high intensity of students’ contact with new audiovisual media has become a subject of pedagogical excitement. There was a problem adjusting your children’s audience and media. The most progressive Canadian educators, who have recognized the futility of trying to differentiate students from the growing impact of TV and cinema, have begun introducing a special course in Screen Arts. The use of teachers of the rich potential of new audiovisual media has greatly optimized the learning process itself, the use of films in the classroom has become increasingly motivated. At the end of 1968, an assistant position was created at the Ontario Department of Education, which coordinated work in the “onscreen education” field. It is worth noting that media education in Canada developed under the influence of English media pedagogy. The first developments in the study of “screen education” were proposed in 1968 by British Professor A. Hodgkinson. Canadian institutions are actively implementing media education programs, as the development of e-learning is linked to the hope of solving a number of socio-economic problems. In particular, raising the general education level of the population, expanding access to higher levels of education, meeting the needs for higher education, organizing regular training of specialists in various fields. After all, on the way of building an e-learning system, countries need to solve a set of complex technological problems to ensure the functioning of an extensive network of training centers, quality control of the educational process, training of teaching staff and other problems. Today, it is safe to say that Canada’s media education is on the rise and occupies a leading position in the world. Thus, at the beginning of the 21st century, Canada’s media education reached a level of mass development, based on serious theoretical and methodological developments. Moreover, Canada remains the world leader in higher education and spends at least $ 25 billion on its universities annually. Only the United States, the United Kingdom and Australia are the biggest competitors in this area.
APA, Harvard, Vancouver, ISO, and other styles
4

Davies, Phil. "Great Britain's Ordnance Survey National GPS Network." Journal of Navigation 53, no. 3 (September 2000): 397–402. http://dx.doi.org/10.1017/s0373463300001041.

Full text
Abstract:
To encourage compatibility of national and global precise positioning of GPS surveys in Great Britain, Ordnance Survey is providing access at no cost to the new National GPS Network, via a website first available in June 2000. By requiring the use of this infrastructure to provide ETRS89 control station coordinates at a stated level of precision, survey clients can be assured that any commissioned survey will be precisely consistent with any other, even if the two are widely spaced in location and time. All such surveys will also be precisely consistent with the Ordnance Survey large-scale base mapping, using the precise National Grid Transformation and National Geoid Model. This is now the Ordnance Survey recommended ‘standard method’ of creating new National Grid coordinate datasets, eventually to replace completely the traditional national control networks of triangulation stations and height bench marks.
APA, Harvard, Vancouver, ISO, and other styles
5

Bonnicksen, Andrea L. "Book Reviews: Leichter - Free To Be Foolish: Politics and Health Promotion in the United States and Great BritainHoward M. Leichter Princeton: Princeton University Press, 1991, 281 pp. US$35.00 cloth. ISBN 0-691-07867-X. Princeton University Press, 41 William St., Princeton, NJ 08540, USA." Politics and the Life Sciences 11, no. 2 (August 1992): 290–92. http://dx.doi.org/10.1017/s0730938400015410.

Full text
Abstract:
PrécisThe author is Professor of Political Science at Linfield College and Clinical Professor of Public Health and Preventive Medicine at Oregon Health Science University. In this book he traces a recent and “important shift in the debate over how people can maximize their chances of staying healthy” (p.7). Populations in both the United States and Great Britain for most of the century have regarded equitable access to health care as the basis for individual health. Within the last two decades, however, assumptions have shifted. Health is now thought to be a preventive exercise to be secured by reducing dangerous and foolish behaviors. In seeking to regulate dangerous behaviors of citizens, policymakers confront deeply seated values of individualism and choice.Leichter advances the thesis that policies that regulate life-styles are fundamentally different from other health policies. As a consequence, a distinct framework for evaluation is necessary, which he presents and elaborates upon throughout the book. He uses historical experiences in two countries—the United States and Great Britain—to develop and refine his thesis.Following historical overviews of the two health revolutions (access to health care and personal life-style monitoring), Leichter deals with four areas in which governments have sought to limit individual activities: smoking, alcohol control, road safety, and behaviors relating to AIDS. In his final chapter he evaluates “when and under what circumstances [it is] appropriate for the state to intervene in life-style decisions” (p. 31). This literate book is supplemented by four figures and thirteen tables.
APA, Harvard, Vancouver, ISO, and other styles
6

Easton, Brian. "La Nouvelle-Zélande : Vers une nouvelle insertion dans le système alimentaire mondial." Études internationales 12, no. 1 (April 12, 2005): 31–44. http://dx.doi.org/10.7202/701155ar.

Full text
Abstract:
Agricultural products are the source of 75 % of 'New Zealand's export eanings. During the 1970 's, the decline in New Zealand's terms of trade (prices of exports of wool, meat and dairy products having risen more slowly than those of manufactured imports), the loss of access to the British market, the rise of protectionism (notably in the EEC of which Great Britain is a member) have posed serious adjustment problems for New Zealand agriculture. However, the "Marshallien entrepreneur" that is the New Zealand farmer, backed up by the State (which centralises control of exports and credit), has risen to the challenge : as a result, production is being diversified and this has facilitated a re-orientation of exports toward countries outside the OECD area. It is the view of the author that such a policy in conformity with the concept of free-trade, permits a more optimistic outlook for the 1980 's.
APA, Harvard, Vancouver, ISO, and other styles
7

Zou, Chi Jia. "Study of Access Algorithms in Wireless Network." Advanced Materials Research 129-131 (August 2010): 1286–90. http://dx.doi.org/10.4028/www.scientific.net/amr.129-131.1286.

Full text
Abstract:
The measure to improve the performance of the wireless network channel is of great significance to the building in the wireless network. Due to IPv6 Agreement is the agreement for the next generation network and the core of it, IPHC header compression technology provides IPv6 basic headers and expanding headers with a good support, so we adopt IPHC header compression scheme which groups the data that need to transmitting, introduce retransmission mechanism and header request mechanism to make IPHC have much compression effect on headers. But IPHC header compression scheme is hard on signal channel, it required that loss rate of transportation link is a little lower. In order to let IPHC better adapt to wireless link, compression based on link state is offered: Using simple portioned Markov model to check channel error rate, adopting RTS/CTS access mechanism to search for link state. Apply OPNET simulation software to imitate and finally achieve the desired target. In past two decades, computer network got rapid development, with the application of computers wider and wider. But because of being limited by areas and time, users couldn’t surf on the Internet, communicate with each other, and transport messages at any time and at any place. In this case, the wireless network developed, wireless network technology also produced therewith. Computer wireless network technology included IEEE802.11 collection [1], bluetooth technology, infrared technology, and broadband wireless technology afterwards and so on. Wireless communication technology contained CDMA, GSM, etc [2-5]. According to access ways, wireless access technology was divided into fixed wireless access technology and mobile wireless access technology with many small parts. Wireless access system consisted of wireless base station, wireless base station controller, operation maintenance center and user units. User units which contained single units and multiunits were connected directly with user terminals. Base station, which provided signal-sending and signal-receiving services for users in one district, was controlled by the controller called center station facility to provide an interface with base station side and operation maintenance center, wireless signal channel control and base station monitor, complete the connection of exchanges and routers. Operation control centre is responsible for operating and maintaining wireless access system machines and managing daily network operations.
APA, Harvard, Vancouver, ISO, and other styles
8

Price, Linda, and Mark Simpson. "The trouble with accessing the countryside in Northern Ireland." Environmental Law Review 19, no. 3 (September 2017): 183–200. http://dx.doi.org/10.1177/1461452917720632.

Full text
Abstract:
The twenty-first century has seen a shift in emphasis from enabling local authorities to provide opportunities for recreation on private land to the conferment of a general right to access certain types of land in Great Britain. Similar liberalisation has not occurred in Northern Ireland. This article examines features of the Northern Ireland context that might explain why landowners’ rights continue to trump those of recreational users, drawing on stakeholder interviews and a rural geography conceptual framework. Following historic struggles for land in Ireland, any erosion of owner control is perceived to undermine hard-won rights; in a relatively rural society and agrarian economy, farmers are readily accepted as having the ‘right’ to determine the function of rural land; and recent conflict has depressed outdoor leisure and tourism. Consequently, productive uses of land remain central to rural policy and a countryside movement able to overcome objections to liberalisation has not emerged. Conflict and instability have also left a legacy of social problems and ‘legislative lag’ in higher priority areas that must be addressed before countryside access can move up the political agenda. The article reveals how, in stakeholders’ eyes, these factors combine to limit the prospects of reform.
APA, Harvard, Vancouver, ISO, and other styles
9

Meidy Adelina Lumban Toruan and Edy Surya. "Analysis Of The Effect Of Blended Learning Models Towards Mathematical Student’s Problem Solving Abilities And Self-Regulated Learning." JURNAL RISET RUMPUN ILMU PENDIDIKAN 2, no. 2 (July 28, 2023): 219–29. http://dx.doi.org/10.55606/jurripen.v2i2.1602.

Full text
Abstract:
A This study aims to determine: (1) the effect of Blended Learning models towards Mathematical Student’s Problem Solving Abilities and Self-Regulated, (2) the improvement of student’s mathematical problem solving and self regulated learning (3) the advantages of the advantages and disadvantages of blended learning model. This type of research includes descriptive qualitative research using library research methods. The data in this study were obtained from a collection of literature such as theses and journals that are relevant to the topic of discussion, namely Mathematical Student’s Problem Solving Abilities And Self-Regulated. The results show that, 1) Blended Learning Model has a great effect on students' problem solving abilities based on the overall effect size calculation which produces an average effect size of 1.56 where this number is included in the high category and Blended Learning Model has a great effect on student’s self-regulated based on the overall effect size calculation which produces an average effect size of 1.73 2) There is an increase in mathematical the student's problem solving abilities and self-regulated learning that are taught through blended learning models. This can be seen from the achievement of N-Gain value and indicators in the experimental class in the literature which is generally better than the control class. 3) Based on the analysis, it was found that the advantages and disadvantages of blended learning. it can be obtained that the advantages of blended learning models as follows: (a) Learning is more effective and efficient, (b) Improve accessibility. with blended learning, it is easier for learning participants to access material learning. and disadvantages of blended learning is Not evenly distributed facilities owned by students, such as computers and internet access. Even though blended learning requires adequate internet access, if the network is inadequate it will make it difficult for participants to take part in independent learning via online.
APA, Harvard, Vancouver, ISO, and other styles
10

Bebell, Damian, and Joseph Pedulla. "A Quantitative Investigation into the Impacts of 1:1 iPads on Early Learner’s ELA and Math Achievement." Journal of Information Technology Education: Innovations in Practice 14 (2015): 191–215. http://dx.doi.org/10.28945/2175.

Full text
Abstract:
Many parents, educators, and policy makers see great potential for leveraging tools like laptop computers, tablets, and smartphones in the classrooms of the world. Although increasing students’ technology access may be associated with increased student achievement, there is little research directly investigating objective measures of student achievement. This study addresses the short-term and long-term quantitative impacts of one of the world’s first school efforts to provide Kindergarten through 3rd grade classrooms with 1:1 iPad access and a range of English Language Arts (ELA) and math Apps. This report summarizes two investigations conducted during this iPad implementation. First, a 9-week pre/post randomized control trial was conducted in which 8 Kindergarten classes used literacy and numeracy apps while another 8 Kindergarten classes used their traditional (non-iPad) resources. At the end of this short implementation period, slightly stronger literacy performance gains were observed in the iPad settings. In a second longitudinal study, three years of assessment data were explored before and after the 1:1 iPad implementation in grades K to 2. Results from the longitudinal study provide emerging evidence of potential increases in ELA achievement, but no consistent results in math achievement. This paper adds to the sparse literature in this area and provides a springboard for further research.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computers – Access control – Great Britain"

1

Grošelj, Darja. "Keeping up with technologies : revisiting the meaning and role of Internet access in digital inclusion." Thesis, University of Oxford, 2015. http://ora.ox.ac.uk/objects/uuid:5f5b5b31-2428-4723-b649-b3e8efd7356f.

Full text
Abstract:
The ways people go online have been transformed by the emergence of new mobile Internet technologies. As modes of Internet access are becoming increasingly diverse, this thesis sets out to examine how various forms of access shape engagement with online resources. Inequalities in Internet access have been neglected in the "second-level digital divide" research, which has focused on differences in skills and usage. Thus, I argue that inequalities of access have to be revisited and their role in digital inclusion reassessed. To study individuals' arrangements of Internet-enabled devices and locations holistically and as a dynamic entity, access is conceptualised as infrastructure. Theoretically, I distinguish between material dimensions of access and social practices shaping access, and draw on existing models of digital inclusion to examine the role of these dimensions and practices in online engagement. Empirically, a mixed methods research design is employed, complementing longitudinal analyses of survey data representative of the British population with 29 qualitative interviews with British Internet users. This study contributes to our understanding of material and social dimensions of access and their impact on Internet use patterns. First, the conceptualisation of Internet access as infrastructure is empirically validated. Second, quality, locality and ubiquity are established as material dimensions of access, where offline social and economic resources most strongly affect inclusion in high-quality, multi-local and ubiquitous Internet access. Third, three specific practices encompassing how users develop and maintain their access infrastructures are identified: spotlighting, distributing and being stranded. They reflect differences in roles Internet technologies play in individuals' daily lives as well as differences in availability of offline resources. Fourth, the results show that, controlling for a range of digital inclusion factors, the access inequalities have significant effects on a range of online engagement types, but are most strongly related to commercial and communication uses of the Internet. In sum, this study provides a nuanced understanding of how different mechanisms underlie the development, maintenance and engagement with Internet access, depending on whether access arrangements are shaped by digital exclusion or choice. Specifically, by outlining critical differences among all-round, mobile-mostly, mobile-only and home-only Internet users, broader policy and research implications are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
2

Hamilton, Ross. "Continuous path : the evolution of process control technologies in post-war Britain." Thesis, University of Warwick, 1997. http://wrap.warwick.ac.uk/3497/.

Full text
Abstract:
Automation - the alliance of a series of advances in manufacturing technology with the academic discipline of cybernetics - was the centre of both popular and technical debate for a number of years in the mid-1950s. Alarmists predicted social disruption, economic hardship, and a massive de-skilling of the workforce; while technological positivists saw automation as an enabling technology that would introduce a new age of prosperity. At the same time as this debate was taking place, increasingly sophisticated control technologies based on digital electronics and the principle of feedback control were being developed and applied to industrial manufacturing systems. This thesis examines two stages in the evolution of process control technology: the numerical control of machine tools; and the development of the small computer, or minicomputer. In each case two key themes are explored: the notion of industrial failure; and the role of new technologies in Britain's industrial decline. In Britain, four projects were undertaken to develop point-to-point or continuous path automatic controllers for machine tools in the mid-1950s - three by electronics firms and one by a traditional machine tool manufacturer. However, although automation was dominating popular debate at the time, the anticipated market for numerically controlled systems failed to appear, and all of the early projects were abandoned. It is argued that while the electronics firms naively misdirected their limited marketing capabilities, the root of the problem was the traditional machine tool manufacturers' conservatism and their failure to embrace the new technology. A decade later, small computers based on new semiconductor technologies had emerged in the United States. Originally developed for roles in industrial automation, they soon began to compete at the low end of the mainframe computer market. Soon afterwards a number of British firms - electronic goods manufacturers, entrepreneurial start-ups, and even office machinery suppliers - began to develop minicomputers. The Wilson government saw computers as a central element of industrial modernisation, and thus a part of its solution to Britain's economic decline, so the Ministry of Technology was charged with the promotion of the British minicomputer industry. However, US-built systems proved more competitive, and by the mid-1970s they had come to dominate the market, with the few remaining British firms relegated as niche players. It is argued that government involvement in the minicomputer industry was ineffectual, and that the minicomputer manufacturers' organisational cultures played a major role in the failure of the British industry.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computers – Access control – Great Britain"

1

Steve, Connor, ed. On the record: Surveillance, computers and privacy - the inside story. London: Joseph, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Campbell, Duncan. On the record: Surveillance, computers, and privacy : the inside story. London: M. Joseph, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hook, Chris. Data protection implications for systems design. Manchester: NCC Publications, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Great Britain. Scottish Office Environment Department. Access to Personal Files (Housing) (Scotland) Regulations 1991: Draft guidance circular. [Edinburgh]: [The Department], 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gale, Colin. After the hundred year rule: Guidance for archivists and records managers on access to medical records under the Freedom of Information Act. Taunton, Somerset: Society of Archivists, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Great Britain. Central Directorate of Environmental Protection., ed. Public access to environmental information: Report of an interdepartmental working party on public access to information held by pollution control authorities. London: H.M.S.O., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Great Britain. Interdepartmental Working Party on Public Access to Information. Public access to environmental information: Report of an Interdepartmental Working Party on Public Access to Information held by pollution control authorities. London: H.M.S.O., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Great Britain. Foreign and Commonwealth Office. Summary of guidance to reviewers of FCO records. [England]: Foreign & Commonwealth Office, General Services Command, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

(Firm), Hammond Suddards, ed. Data protection. London: Institute of Personnel and Development, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Arbitration, Permanent Court of. The OSPAR arbitration (Ireland - United Kingdom) award of 2003 / with an introduction by Daniel Bodansky. The Hague: T.M.C. Asser, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computers – Access control – Great Britain"

1

Baecker, Ronald M. "Safety." In Computers and Society. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198827085.003.0014.

Full text
Abstract:
Safety is often confused with security. A system or an environment may be secure, but if its normal operation does not achieve the intended goals, it may not be safe. Events will not progress as intended, and could go horribly wrong, even to the extent of grave injuries and loss of life. The more society relies upon digital technologies, the more we count on software to assure our safety. The issue of safety arises in a great variety of circumstances. Our discussion will start with dangers to the individual, then we will widen our focus to the organization, to society, and, finally, to the world. The digital divide that discourages internet use among older adults is due in part to threats posed to safe use of computers by ‘evil’ software such as programs that ‘phish’ for personal information, thereby gaining access to finances and committing identity theft, as we have discussed in the previous chapter. We shall enlarge upon this discussion by speaking of another risk—computer rage, which is caused by frustration when users cannot understand or manage the technology. Such instances are especially dangerous for senior citizens. We shall also discuss two ways in which the internet may not be safe for younger people: cyberbullying and revenge porn. We then examine a topic that arises in daily life: safety threats caused to pedestrians, bicyclists, and drivers by the continual use of distracting mobile devices. Our inability to control the costs of large-scale data processing implementations is a threat to the safety and health of organizations and governments, as is our inability to understand, modify, and fix large software systems that are no longer maintained by their creators. We shall describe several software disasters, both during their development and after they have been deployed and used. These include the software crisis at the turn of the century—the Y2K threat—which actually was averted, and several cases in which up to billions of dollars or pounds were wasted, including the decades-long saga of air traffic control in the USA.
APA, Harvard, Vancouver, ISO, and other styles
2

Baecker, Ronald M. "Digital media and intellectual property." In Computers and Society. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198827085.003.0007.

Full text
Abstract:
Vannevar Bush envisioned a machine that would assist humanity in the creative work of writing. Doug Engelbart imagined the collaborative sharing and enhancement of knowledge. Digital media today—text, drawings, photos, audio, and video—surpass the visions of their pioneers. These media may be copied, shared, and modified in ways that challenge the legal system, because unrestricted content sharing without suitable payment to creators runs counter to intellectual property (IP) traditions and laws. Writers, musicians, artists, and inventors have long relied upon IP protection to enable them to control the use of their creations and inventions. Copyright infringement, that is, copying in violation of copyright, threatens the income that they could receive from their creations. The concept of fair use is a critical issue in such discussions, as it allows certain exceptions to copyright. One area that has received a great deal of attention is the digital copying and sharing of music; we shall examine the interplay between conventional behaviour, ethics, technical interventions to limit or block copying, laws and legal battles, and product and pricing innovation. Next, we shall look at similar issues in the domain of motion pictures. There are effective and legal streaming services, yet there are still concerns about copyright infringement. Copyright holders now automatically produce takedown notices to insist that websites remove illegally or improperly sourced material. Such notices include many errors, causing additional complications for video creators. One interesting challenge to the concept and laws of copyright occurs in the creation of mash-ups. Artists use fragments from existing musical or visual performances as well as their own material to create audio-visual works that combine multiple content sources. Artists, lawyers, and businesspeople debate the extent to which such mash-ups violate reasonable copyright protection. Copyright is also significant for academic articles and textbooks. There are two especially interesting cases to discuss. One is the widespread copying of textbooks by students due to the high price of texts. The other is the fair pricing of the publication of research results that have been funded by government grants. This issue has provided one of several stimuli to the creation of open access publications.
APA, Harvard, Vancouver, ISO, and other styles
3

Marcelle, Gillian M. "A Feminist Agenda for Reducing the Gender Digital Divide." In Global Information Technologies, 3126–48. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch221.

Full text
Abstract:
There is little shared understanding of the term “digital divide,” but this has not prevented the international community from investing a great deal of effort in projects that aim to reduce the digital divide by reducing disparities in access to information and communication technologies (ICT) (European Commission High Level Group, 1997; International Telecommunication Union [ITU], 1984, 2003; United Nations Economic and Social Commission [UN ECOSOC], 2000). The divergent rate at which ICT diffuses—the digital divide—is a reflection of broader socioeconomic divides, many of which exist within societies. The divide between men and women, rich and poor, young and old, urban and rural, literate and non-literate, also manifests itself in the digital world of media, computers, telecommunications, Internet, and jobs in software production. Information and communication flows carried by ICT are increasingly becoming an integral factor in international, institutional, and political processes. Lack of access to ICT therefore impacts on opportunities for developing countries’ economic growth, wealth distribution, social empowerment, and development. It is the digital divide which largely prevents the equal sharing of knowledge worldwide and leads to “information and knowledge poverty” among certain groups. If only a select number of countries, and within them certain groups, reap the benefits of ICT while others continue to lag behind, the digital divide will continue to grow and the virtuous cycle that ICT can create will not be enjoyed by many (Millward-Oliver, 2005). There is little acknowledgment and even less acceptance that gender constitutes an important influence in the structure of the “digital divide.” At first glance, this failure to admit context may seem strange and out of step with common sense. Why should gender relations, such an important and pivotal element of social structure, that is known to influence differentiated access to financial resources, employment opportunities, education and training, water and sanitation, health care, legal status, and enjoyment of human-rights not affect access to and control of ICT? This article will explore some of the key factors that lead to gender blindness in the digital divide debate and articulate a strategic response
APA, Harvard, Vancouver, ISO, and other styles
4

Beinart, William, and Lotte Hughes. "Oil Extraction in the Middle East: The Kuwait Experience." In Environment and Empire. Oxford University Press, 2007. http://dx.doi.org/10.1093/oso/9780199260317.003.0020.

Full text
Abstract:
Oil has been the lubricant of international relations and industry since the turn of the twentieth century. The fabulous wealth it has generated for a clutch of individuals, states, and corporations has skewed global politics, fed human greed, fuelled conflict, and brought as much destruction as delight in its wake. The struggle for access to and control over oil was central to the final stages of imperial expansion, and the Middle East saw a regional equivalent of the ‘scramble for Africa’. European powers sought to carve up the area as the twentieth century turned, their eyes fixed on oil as the main prize. Central to our argument is that empire followed natural resources, in unpredictable ways. It created commodity frontiers that had enormous implications for routes of expansion and relations with local societies. The future of the Middle East, then under the sway of the crumbling Ottoman Empire, was already of great concern to Britain at the beginning of the twentieth century. But oil provided a new urgency, and shaped patterns of intervention; the history of the Middle East over the next century would have been profoundly different without it. Although capital became more mobile from the late nineteenth century, some of the most valuable natural resources in the twentieth-century Empire proved to be rooted to specific regions. In this sense, oil as a natural resource shaped the geography of empire, as had fur and forests before it. But the specific character of oil and of imperialism in the region (our focus is on Kuwait), resulted in rather different outcomes for local societies than those experienced on some other earlier commodity frontiers. Although the oil companies were largely foreign-owned, Middle Eastern people were, to a much greater degree, beneficiaries of resource extraction. In this respect, there are parallels with Malaysia. An important concern in this chapter is to chart the impact of oil on Bedouin pastoralists in Kuwait, their use of the desert, and its environmental implications. We also explore briefly other environmental impacts of oil exploitation. These are issues less frequently rehearsed than the political and economic consequences. The energy needs of the metropolitan world led to increasing demands for oil as the twentieth century advanced.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computers – Access control – Great Britain"

1

Kambovski, Igor. "RAČUNARSTVO U OBLAKU – PRAVNA PITANjA I DILEME." In XVIII Majsko savetovanje. University of Kragujevac, Faculty of Law, 2022. http://dx.doi.org/10.46793/xviiimajsko.379k.

Full text
Abstract:
Cloud computing is a part of our everyday life, a revolutionary invention of the 21st century that overcomes perhaps the biggest problem since the advent of the Internet and online communications and transactions - the problem of secure data transfer and storage. Cloud Computing is a modern technology that enables the use of IT services remotely, over the Internet and a network of physically remote servers. This type of computing provides great opportunities for consumers, customers, companies, all interested parties to communicate and do business online, with a significant reduction in costs and investment in hardware and software. Cloud computing services are accessible and attractive to users, primarily because they are either free or the price for their use is symbolic. Cloud computing, compared to the standard model of using home or office computers at work, differs in that the entire load for storing data and applications from the computer is transferred to the network and then to the cloud servers, so that all information and applications which we need can be found in the cloud. Servers are located in several locations around the world, on so-called "server farms" and guarantee continuous and stable access to applications, data storage and protection and control of all data and background processes. Users of cloud computing services need a computer with an Internet browser, a stable Internet connection and a concluded subscription agreement with a provider that provides such services. Cloud computing agreements and contracts are usually made online. The contract may also specify security measures (eg requests for cleaning or deleting data on damaged media, storage of customer data on private hardware, storage and diversification of data in different locations, etc.). The legal rules applicable to cloud computing contracts may require that the contract be in written form, especially when it comes to the processing and storage of personal data, and that all supporting documents be attached to the main contract. Even when no written form is required, for reasons of legal certainty, ease of reference, clarity, completeness, enforceability and efficiency of the contract, the parties may decide to conclude the contract in writing.
APA, Harvard, Vancouver, ISO, and other styles
2

Colagrossi, Andrea, Stefano Silvestrini, and Michèle Lavagna. "Flat-sat facility for processor-in-the-loop verification and testing of nanosatellite ADCS." In ESA 12th International Conference on Guidance Navigation and Control and 9th International Conference on Astrodynamics Tools and Techniques. ESA, 2023. http://dx.doi.org/10.5270/esa-gnc-icatt-2023-206.

Full text
Abstract:
Small spacecraft missions are experiencing an increasing interest from the space community, because of their capability to reduce the cost of space access and of their potential to accomplish operations, complementary or even similar to larger monolithic spacecraft. However, these miniaturized systems typically suffer from poor reliability and their infant mortality rate remains quite high [1]. This is primarily due to the limited cost budget not allowing extensive verification and testing activities, which are still the key elements to ensure a high-quality standard guaranteeing space mission success and survivability. On the other hand, the verification and testing phase cannot reach the complexity and the level of classical spacecraft missions, since in that case the mission cost would dramatically increase. For these reasons, advanced and tailored AIV/AIT processes are needed. The ADCS and, more generally, the GNC subsystems are commonly absorbing a relevant fraction of the AIV/AIT budget because of their need of dedicated and very specific facilities. For example, full hardware-in-the-loop (HIL) testing of a basic ADCS subsystem requires, at the minimum, a 3DOF frictionless bearing, a Sun simulator, and a Helmholtz cage [2]. More complex sensor architectures may require additional environmental simulation devices, and each specific mission may impose a specific facility customization. Moreover, the calibration and the set-up of such hardware-in-the-loop test benches is difficult and time consuming. Thus, a flexible and efficient verification and testing facility is extremely beneficial for the verification and testing of nanosatellite GNC subsystems. The main idea to realize this verification and testing equipment, described in this work, is based on the virtualization of all the components associated with a dynamical measurement. In this way, it is possible to recreate a digital twin of the moving platform with all the associated sensors and actuators, leaving the on-board processor as the flight component under test without the need for any movable element. However, not to reduce the coverage and the significance of the verification and testing activities, all the real electrical and data interfaces shall be maintained and the on-board data handling (OBDH) subsystem shall not experience significant timing and data communication differences with respect to the real scenario. The facility designed and built by the ASTRA team at Politecnico di Milano, Department of Aerospace Science and Technology, is able to achieve these goals and implements an enhanced processor-in-the-loop facility for nanosatellites. The current development status allows to assess the functionalities of the facility, and to apply it for the real-time verification and testing of a specific nanosatellite ADCS subsystem. It is still in a breadboarding status for a fast and efficient implementation and integration, but it is ready for consolidation and upgrade to a definitive version. Specifically, the final status will exploit standard industrial connectors and micro-controllers in place of the jumper wires and the Arduino boards. Moreover, generic ADCS and GNC subsystem will be fully compatible with the facility. The processor-in-the-loop facility is based on a software simulation section and a hardware interface section. The software part is based on a validated Functional Engineering Simulator (FES) running on MATLAB/Simulink and exploiting the Simulink Real-Time capabilities on a Windows PC. It contains a Dynamics-Kinematics-Environment (DKE) section developed according to the ECSS standards [3-4] and the simulators of sensors and actuators. These are high-fidelity functional models of the specific sensors and actuators on-board the spacecraft, whose output is numerically identical to the one of the real components. In particular, the output data are defined in terms of data-type, output format and frequency. These sensor and actuator models are calibrated with dedicated hardware-in-the-loop testing campaigns on the specific spacecraft components. The sensor data exits from the simulator environment through a real-time serial peripheral component. Then, they are received from the Arduino micro-controllers and formatted according to the data protocol and communication standards of the real component. The current development status implements I2C, Serial RS-232, RS-422, SPI data communication standards, and the data interface protocol is written according to the component specifications. The facility also includes the possibility to transduce PWM signals in order to be interfaced with analogic components requiring this modulation technique. The programming of the micro-controllers is made in C language allowing a great flexibility in reproducing different communication and data protocols for different sensor and actuator typologies with respect to the one currently in use. After the data processing, all the data are made available to the on-board computers through the same hardware interfaces and connections that will be used on the spacecraft. However, to guarantee the safety of the components under test, the facility is electrically isolated from the spacecraft section. For this purpose, dedicated digital isolator boards have been designed. At the end of the process, the output commands of the ADCS for the actuators are sent back to the software section through the same digital isolator to micro controller to serial peripheral to MATLAB/Simulink path. In this way, a closed loop real-time simulation is performed on the developed ADCS algorithms running on the real hardware exploiting an equivalent digital twin of the on-board set-up. The paper presents the main features and characteristics of this flat-sat facility for PIL verification and testing of nanosatellite ADCS. It outlines the main design, implementation and verification steps. Furthermore, it discusses the future extension of the facility and its consolidation in a final development status for generic applications to any ADCS or GNC subsystem REFERENCES [1] Villela, Thyrso, et al. "Towards the thousandth CubeSat: A statistical overview." International Journal of Aerospace Engineering, 2019. [2] Modenini, Dario, et al. "A dynamic testbed for nanosatellites attitude verification." Aerospace 7.3 (2020): 31. [3] ECSS. Space engineering: Space environment. Technical Report ECSS-E-ST-10-04C, European Cooperation for Space Standardization, 2008. [4] ECSS. Space engineering: System modelling and simulation. Technical Report ECSS-E-TM-10-21A, European Cooperation for Space Standardization, 2010
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography