Academic literature on the topic 'Primary User Privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Primary User Privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Primary User Privacy"

1

Clark, Matthew, and Konstantinos Psounis. "Optimizing Primary User Privacy in Spectrum Sharing Systems." IEEE/ACM Transactions on Networking 28, no. 2 (April 2020): 533–46. http://dx.doi.org/10.1109/tnet.2020.2967776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jagwani, Priti, and Saroj Kaushik. "Entropy-Based Quantification of Privacy Attained Through User Profile Similarity." International Journal of Information Security and Privacy 15, no. 3 (July 2021): 19–32. http://dx.doi.org/10.4018/ijisp.2021070102.

Full text
Abstract:
Location-based services refer to services that use location as primary input. But accessing user's location by an adversary invites issues of privacy breach. Instead of specific location coordinates, its surrounding area known as cloaking region is revealed in order to get the service. K anonymity technique of location privacy ensures that at least K-1 users should be included within a specific cloaked region. Researches have established that on combining K anonymity with the idea of including similar users together in a cloaked region provides stringent privacy (especially from background and heterogeneity attacks). This work quantifies the amount of privacy gain attained through, opting-for users with similar profiles instead of random users. The quantification is done by using KL divergence. Values of KL divergence of user profiles have been calculated for different cloaking regions containing similar and random users. Low KL divergence values depict privacy gains up to 33% for users with similar profiles.
APA, Harvard, Vancouver, ISO, and other styles
3

Ullah, Mohib, Muhammad Arshad Islam, Rafiullah Khan, Muhammad Aleem, and Muhammad Azhar Iqbal. "ObSecure Logging (OSLo): A Framework to Protect and Evaluate the Web Search Privacy in Health Care Domain." Journal of Medical Imaging and Health Informatics 9, no. 6 (August 1, 2019): 1181–90. http://dx.doi.org/10.1166/jmihi.2019.2708.

Full text
Abstract:
Users around the world send queries to the Web Search Engine (WSE) to retrieve data from the Internet. Users usually take primary assistance relating to medical information from WSE via search queries. The search queries relating to diseases and treatment is contemplated to be the most personal facts about the user. The search queries often contain identifiable information that can be linked back to the originator, which can compromise the privacy of a user. In this work, we are proposing a distributed privacy-preserving protocol (OSLo) that eliminates limitation in the existing distributed privacy-preserving protocols and a framework, which evaluates the privacy of a user. The OSLo framework asses the local privacy relative to the group of users involved in forwarding query to the WSE and the profile privacy against the profiling of WSE. The privacy analysis shows that the local privacy of a user directly depends on the size of the group and inversely on the number of compromised users. We have performed experiments to evaluate the profile privacy of a user using a privacy metric Profile Exposure Level. The OSLo is simulated with a subset of 1000 users of the AOL query log. The results show that OSLo performs better than the benchmark privacy-preserving protocol on the basis of privacy and delay. Additionally, results depict that the privacy of a user depends on the size of the group.
APA, Harvard, Vancouver, ISO, and other styles
4

Jaiswal, Mimansa, and Emily Mower Provost. "Privacy Enhanced Multimodal Neural Representations for Emotion Recognition." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 7985–93. http://dx.doi.org/10.1609/aaai.v34i05.6307.

Full text
Abstract:
Many mobile applications and virtual conversational agents now aim to recognize and adapt to emotions. To enable this, data are transmitted from users' devices and stored on central servers. Yet, these data contain sensitive information that could be used by mobile applications without user's consent or, maliciously, by an eavesdropping adversary. In this work, we show how multimodal representations trained for a primary task, here emotion recognition, can unintentionally leak demographic information, which could override a selected opt-out option by the user. We analyze how this leakage differs in representations obtained from textual, acoustic, and multimodal data. We use an adversarial learning paradigm to unlearn the private information present in a representation and investigate the effect of varying the strength of the adversarial component on the primary task and on the privacy metric, defined here as the inability of an attacker to predict specific demographic information. We evaluate this paradigm on multiple datasets and show that we can improve the privacy metric while not significantly impacting the performance on the primary task. To the best of our knowledge, this is the first work to analyze how the privacy metric differs across modalities and how multiple privacy concerns can be tackled while still maintaining performance on emotion recognition.
APA, Harvard, Vancouver, ISO, and other styles
5

AlMarzooqi, Fatima Mohamed, Immanuel Azaad Moonesar, and Raeda AlQutob. "Healthcare Professional and User Perceptions of eHealth Data and Record Privacy in Dubai." Information 11, no. 9 (August 28, 2020): 415. http://dx.doi.org/10.3390/info11090415.

Full text
Abstract:
Introduction: Dubai city made a significant leap forward, which aligns with the vision of leadership, in the region’s eHealth services by adopting a unified electronic medical record system across the country. Electronic medical records provide a better, more efficient standard of care and a vital database that will streamline the administrative process and promote better outcomes with less utilization of resources. Medical records form an essential part in patient management and include a variety of patient data information that might be sensitive. Therefore, the primary challenge is to maintain data privacy of the electronic medical records. Objective: Current studies to measure the user and health provider perceptions of electronic medical records data privacy are limited in the region. We aimed to investigate the perceptions of healthcare professionals and healthcare users toward electronic medical records and data privacy in eHealthcare facilities in Dubai. Methods: In this quantitative descriptive study, we explored the perceptions towards electronic medical records and data privacy using an online survey as a data collection tool. The dependent variables were the user and provider perceptions, while the independent variables included gender, nationality, income and age. A random sample of 201 eHealthcare facilities professionals and users was included. Results: The findings of the study revealed that most healthcare professionals and users agreed on the presence of good eHealth data protection practices and privacy principles in Dubai. There was a statistical correlation between the surveyed privacy practice perceptions and gender, nationality and income. However, age had no statistically significant association. Conclusions: These research findings can influence policymakers and stakeholders when developing electronic medical records and data privacy policies and guidelines across the United Arab Emirates’ healthcare facilities, in particular, during the implementation of unified electronic medical records. Future research could investigate the effect of the specific demographic variables on the perception of privacy among eHealthcare facility users that might influence electronic medical records and data privacy.
APA, Harvard, Vancouver, ISO, and other styles
6

S. Jahromi, Mohammad N., Pau Buch-Cardona, Egils Avots, Kamal Nasrollahi, Sergio Escalera, Thomas B. Moeslund, and Gholamreza Anbarjafari. "Privacy-Constrained Biometric System for Non-Cooperative Users." Entropy 21, no. 11 (October 24, 2019): 1033. http://dx.doi.org/10.3390/e21111033.

Full text
Abstract:
With the consolidation of the new data protection regulation paradigm for each individual within the European Union (EU), major biometric technologies are now confronted with many concerns related to user privacy in biometric deployments. When individual biometrics are disclosed, the sensitive information about his/her personal data such as financial or health are at high risk of being misused or compromised. This issue can be escalated considerably over scenarios of non-cooperative users, such as elderly people residing in care homes, with their inability to interact conveniently and securely with the biometric system. The primary goal of this study is to design a novel database to investigate the problem of automatic people recognition under privacy constraints. To do so, the collected data-set contains the subject’s hand and foot traits and excludes the face biometrics of individuals in order to protect their privacy. We carried out extensive simulations using different baseline methods, including deep learning. Simulation results show that, with the spatial features extracted from the subject sequence in both individual hand or foot videos, state-of-the-art deep models provide promising recognition performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Ghosh, Isha, and Vivek Singh. "Phones, privacy, and predictions." Online Information Review 44, no. 2 (October 23, 2018): 483–502. http://dx.doi.org/10.1108/oir-03-2018-0112.

Full text
Abstract:
Purpose Mobile phones have become one of the most favored devices to maintain social connections as well as logging digital information about personal lives. The privacy of the metadata being generated in this process has been a topic of intense debate over the last few years, but most of the debate has been focused on stonewalling such data. At the same time, such metadata is already being used to automatically infer a user’s preferences for commercial products, media, or political agencies. The purpose of this paper is to understand the predictive power of phone usage features on individual privacy attitudes. Design/methodology/approach The present study uses a mixed-method approach, involving analysis of mobile phone metadata, self-reported survey on privacy attitudes and semi-structured interviews. This paper analyzes the interconnections between user’s social and behavioral data as obtained via their phone with their self-reported privacy attitudes and interprets them based on the semi-structured interviews. Findings The findings from the study suggest that an analysis of mobile phone metadata reveals vital clues to a person’s privacy attitudes. This study finds that multiple phone signals have significant predictive power on an individual’s privacy attitudes. The results motivate a newer direction of automatically inferring a user’s privacy attitudes by leveraging their phone usage information. Practical implications An ability to automatically infer a user’s privacy attitudes could allow users to utilize their own phone metadata to get automatic recommendations for privacy settings appropriate for them. This study offers information scientists, government agencies and mobile app developers, an understanding of user privacy needs, helping them create apps that take these traits into account. Originality/value The primary value of this paper lies in providing a better understanding of the predictive power of phone usage features on individual privacy attitudes.
APA, Harvard, Vancouver, ISO, and other styles
8

Deni Ardiansyah and Lies Handrijaningsih. "The Impact Of E-Service Quality To Wards Customre Satisfaction On The User Of Internet Banking In PT. Bank Rakyat Indonesia Tbk (Persero)." International Journal of Science, Technology & Management 2, no. 4 (July 25, 2021): 1415–22. http://dx.doi.org/10.46729/ijstm.v2i4.254.

Full text
Abstract:
This research aims to analyze the impact of electronic service quality which consists of efficiency, fulfillment, reliability, privacy, responsiveness, contact, and compensation towards the customer satisfaction on the user of internet banking in PT Bank Rakyat Indonesia, Persero. Customer satisfaction is an urgent matter in banking and is one of the company duty to create that satisfaction out of every single service provided. The sample used in this research are respondents which are customers who use internet banking service from BRI. The data used in this research is primary data collected by conducting online questionnaires to 150 respondents. Analyzing technique used is validity, reliability, classical assumption, multiple linear regression, t, F, and the coefficient of determination test. The result shows that simultaneously, electronic service quality which consists of efficiency, fulfillment, reliability, privacy, responsiveness, contact, and compensation do have an impact towards customer satisfaction on the user of internet banking service of BRI. The finding on partial test shows that efficiency, fulfillment, contact and compensation has an impact towards customer satisfaction whereas reliability, privacy, and responsiveness do not.
APA, Harvard, Vancouver, ISO, and other styles
9

Cohn, Ellen R., and Jana Cason. "Editors' Note." International Journal of Telerehabilitation 9, no. 1 (June 29, 2017): 1–2. http://dx.doi.org/10.5195/ijt.2017.6221.

Full text
Abstract:
The current issue of the International Journal of Telerehabilitation (IJT) contains original work that explores the feasibility of telerehabilitation for a diversity of purposes: a health and wellness program for caregivers; a phonological awareness program for children with hearing loss; telepractice in a school setting for at-risk youth; occupational therapy home visits employing mHealth to facilitate discharge from the acute admission back to the community, and speech and language intervention for primary school-aged children. The issue’s lead article, “Privacy and Security in Multi-User Health Kiosks” offers an audit protocol that can be used to assess whether a multi-user health kiosk is meeting privacy and security regulations such as HIPAA and HITECH.
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Dhruti P., and Devesh C. Jinwala. "Aggregate Searchable Encryption With Result Privacy." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 62–82. http://dx.doi.org/10.4018/ijisp.2020040104.

Full text
Abstract:
With searchable encryption (SE), the user is allowed to extract partial data from stored ciphertexts from the storage server, based on a chosen query of keywords. A majority of the existing SE schemes support SQL search query, i.e. 'Select * where (list of keywords).' However, applications for encrypted data analysis often need to count data matched with a query, instead of data extraction. For such applications, the execution of SQL aggregate query, i.e. 'Count * where (list of keywords)' at server is essential. Additionally, in case of semi-honest server, privacy of aggregate result is of primary concern. In this article, the authors propose an aggregate searchable encryption with result privacy (ASE-RP) that includes ASearch() algorithm. The proposed ASearch() performs aggregate operation (i.e. Count *) on the implicitly searched ciphertexts (for the conjunctive query) and outputs an encrypted result. The server, due to encrypted form of aggregate result, would not be able to get actual count unless having a decryption key and hence ASearch() offers result privacy.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Primary User Privacy"

1

Makin, Cameron. "Primary User Obfuscation in an Incumbent Informed Spectrum Access System." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104015.

Full text
Abstract:
With a growing demand for spectrum availability, spectrum sharing has become a high-profile solution to overcrowding. In order to enable spectrum sharing between incumbent/primary and secondary users, incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility for PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation scheme can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
Master of Science
With a growing demand for spectrum availability, wireless spectrum sharing has become a high-profile solution to spectrum overcrowding. In order to enable spectrum sharing between incumbent/primary (e.g.,federal communications, naval radar, users already grandfathered into the band) and secondary users (e.g., commercial communications companies), incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the incumbent informed SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility of PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation tactic can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
APA, Harvard, Vancouver, ISO, and other styles
2

张弦 and Xian Zhang. "Explaining public-private partnerships in China: case study of primary land development in Beijing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47849368.

Full text
Abstract:
Public-private partnership (PPP) has been an important issue in recent decades. PPP is seen by some as a cure for inefficient and over-burdensome modern government. Yet, by observing practices in China, this research aims to answer the simple questions: why has there been a decline in PPPs? How does government decide whether or not to establish partnership with private enterprises? By investigating the case of Primary Land Development (PLD) in China especially in Beijing, this research has attempted to provide explanations mainly in relation to coordination effectiveness involving a resource interdependence theory. Logic of institutionalism is followed. External environment, key institutions and attributes of PLD field are also carefully examined to further explain the change of resources and coordination effectiveness. This research conducts longitudinal comparison of cases within one case city: Beijing. The focal level is Beijing municipal level. Three time horizons are examined, which are 2002—2004, 2005—2008, and 2009-2010. The First-hand data in this study have two main sources: in-depth interviews with key policy participants and archives acquired through fieldwork. Secondary data including statistical yearbooks, laws and policies, news, and research carried out by previous students are also employed by the research. This research examines the changes of external political and economic environment in each time horizon. It compares the coordination effectiveness between PLD policy-makers and PLD implementers and between PLD implementers and other stakeholders in PLD process within each time period. Through examining the three stages of PLD in Beijing, this research develops the following findings. First, fiscal decentralization and cadre management are two important elements shaping the incentives of policy-makers in China. Second, coordination effectiveness in two dimensions influence policy-makers in decisions related to PPP. Third, the degree and the extent of resource interdependence influences whether coordinator can employ the most suitable and effective mechanisms to coordinate. Fourth, changes to the external economic and political environment will change the incentives and policy choices of policy-makers, and also change the resources held by different actors. Fifth, coordination matters. When traditional mechanisms such as hierarchy and the market do not work well in many cases, the ability to employ new coordination mechanisms such as networks is particularly important in achieving the desired goals of coordinators. Finally, in countries like China which is dominated by political logic, the more politically significant a field is, the less likely it is that PPPs will exist.
published_or_final_version
Politics and Public Administration
Doctoral
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
3

Khemsiri, Praphamontripong Heyl Barbara Sherman Padavil George. "Leadership styles used in team building by administrators from accredited private primary schools in Bangkok." Normal, Ill. Illinois State University, 2002. http://wwwlib.umi.com/cr/ilstu/fullcit?p3088030.

Full text
Abstract:
Thesis (Ph. D.)--Illinois State University, 2002.
Title from title page screen, viewed January 3, 2006. Dissertation Committee: Barbara Heyl, George Padavil (co-chairs), Linda Lyman, Paul Baker. Includes bibliographical references (leaves 208-215) and abstract. Also available in print.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Primary User Privacy"

1

Salleh, Dani, and Mazlan Ismail. Infrastructure procurement framework for local authority. UUM Press, 2015. http://dx.doi.org/10.32890/9789670474434.

Full text
Abstract:
The spread of infrastructure requirements and variety in mechanisms used to secure contributions (infrastructure provision) from private sector was a reflection of the institutional framework in planning system.The study has identified that although both private and local authorities have a good understanding of the fundamental of concept of local infrastructure provision and the arguments for and against the use of private provision, there are still considerable areas of uncertainty surrounding the precise definition (as prescribed in the relevant legislations) and measurements of the key elements pertaining to local infrastructure.The findings revealed that the previous studies has tended to examine the nature of the practice of the infrastructure delivery within the framework of national economy and very little focus has been given to a comprehensive examination on how private developers can be involved in local infrastructure development.The primary problem is that there is no single framework available at the local level that might be considered or applied to secure infrastructure from private developers.The study then provides the parameters for securing contributions towards infrastructure provision. To achieve a complete understanding of this issue, it is necessary to appreciate the broader picture of what is required in terms of infrastructure for the operation of the urban environment.
APA, Harvard, Vancouver, ISO, and other styles
2

Paul, Torremans. Part VI The Law of Property, 33 Corporations. Oxford University Press, 2017. http://dx.doi.org/10.1093/law/9780199678983.003.0033.

Full text
Abstract:
This chapter examines the legal system governing corporations in relation to private international law. It begins with a discussion of the domicile of a corporation, which is sometimes used as a connecting factor for corporations in private international law, even if the concept of domicile applies primarily to natural persons. An example of a statute that uses the concept of domicile for corporations is the Income and Corporation Taxes Act 1988. Whereas every natural person gets a domicile of origin upon birth, a corporation's domicile is linked to its incorporation. A corporation is therefore domiciled in the country under whose law it was incorporated. The chapter also considers jurisdictional issues relating to a corporation's residence, status and capacity, internal management, and winding up.
APA, Harvard, Vancouver, ISO, and other styles
3

Randhawa, Gurvaneet S., and Edwin A. Lomotan. Harnessing Big Data-Based Technologies to Improve Cancer Care. Edited by David A. Chambers, Wynne E. Norton, and Cynthia A. Vinson. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190647421.003.0034.

Full text
Abstract:
Big data promises to harness the power of advanced computing to transform health and health care, including cancer research and care delivery. In health care, big data can be generated by administrative and clinical processes, by patients and families, and by machines. Ultimately, the goal of big data is to transform data into actionable knowledge with attention to four dimensions: person-level data collection; data access, exchange, and aggregation; population-level analytics; and provider, researcher, or patient-facing clinical decision support. A fabric of trust forms the basis for policies for governance, privacy and security, and confidentiality. This chapter offers several examples of the application of big data along the cancer care continuum, ranging from primary prevention through diagnosis, survivorship, and end-of-life care. Challenges to the effective collection and use of big data include its integration with health care delivery; interoperability; and the need for validated, well-designed informatics tools.
APA, Harvard, Vancouver, ISO, and other styles
4

Kearney, Joseph D., and Thomas W. Merrill. Lakefront. Cornell University Press, 2021. http://dx.doi.org/10.7591/cornell/9781501754654.001.0001.

Full text
Abstract:
How did Chicago, a city known for commerce, come to have such a splendid public waterfront — its most treasured asset? This book reveals a story of social, political, and legal conflict in which private and public rights have clashed repeatedly over time, only to produce, as a kind of miracle, a generally happy ending. The book's authors study the lakefront's evolution from the middle of the nineteenth century to the twenty-first. Their findings have significance for understanding not only Chicago's history but also the law's part in determining the future of significant urban resources such as waterfronts. The Chicago lakefront is where the American public trust doctrine, holding certain public resources off limits to private development, was born. The book describes the circumstances that gave rise to the doctrine and its fluctuating importance over time, and reveals how it was resurrected in the later twentieth century to become the primary principle for mediating clashes between public and private lakefront rights. The book compares the effectiveness of the public trust idea to other property doctrines, and assesses the role of the law as compared to more institutional developments, such as the emergence of sanitary commissions and park districts, in securing the protection of the lakefront for public uses. By charting its history, the book demonstrates that the lakefront's current status is in part a product of individuals and events unique to Chicago. But technological changes, and a transformation in social values in favor of recreational and preservationist uses, also have been critical. Throughout, the law, while also in a state of continual change, has played at least a supporting role.
APA, Harvard, Vancouver, ISO, and other styles
5

Olsen, Jan Abel. Funding sources: an overview. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198794837.003.0009.

Full text
Abstract:
This chapter provides an overview of alternative funding sources. It starts with the ‘three-party model’ to illustrate the money flows between households, providers, and purchasers, that is, government and private insurance as the third-party payers. The chapter distinguishes four funding sources which in sum will represent the total budget for possible healthcare expenditures: (1) patient payments (commonly referred to as ‘out-of-pocket’ payments); (2) private health insurance; (3) tax funding, including social insurance systems with payroll contributions; and (4) donations. These four sources of revenue can be explained by people’s preferences for their own health insurance as well as their willingness to cross-subsidize fellow citizens’ use of healthcare. International comparisons show wide disparities in the proportions of funding sources, primarily reflecting how wealthy a country is.
APA, Harvard, Vancouver, ISO, and other styles
6

Fisher, Talia. Law and Economics of Alternative Dispute Resolution. Edited by Francesco Parisi. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199684250.013.008.

Full text
Abstract:
Alternative dispute resolution (ADR) refers to a variety of private processes for resolving disputes, independent of trial before a court of law. Economists are interested in ADR for two main reasons. First, from an ex post perspective, the manner in which disputes are resolved or decided in society affects the operation of the legal system and its cost-efficiency. Second, from an ex ante perspective, the manner in which rights are vindicated impacts primary behavior and investments in prospective dispute avoidance. The literature relating to the economic analysis of ADR can be divided into two facets: one facet is dedicated to the interests of litigating parties to make use of ADR mechanisms; the other is directed at the social interest in ADR. This chapter identifies the conditions under which parties will be incentivized to enter into ADR proceedings, and then moves on to examine the social welfare implications of ADR.
APA, Harvard, Vancouver, ISO, and other styles
7

Adsul, Prajakta, and Purnima Madhivanan. Assessing the Community Context When Implementing Cervical Cancer Screening Programs. Edited by David A. Chambers, Wynne E. Norton, and Cynthia A. Vinson. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190647421.003.0032.

Full text
Abstract:
This case study demonstrates the use of qualitative, community-based, participatory research to understand the context in which cervical cancer screening programs are implemented in rural India, thereby enabling not just successful implementation but also future sustainability of the program in the community. A series of studies were undertaken to understand the cervical cancer screening program in its current state and provide information for the implementation of future programs. These studies included (1) qualitative interviews with physicians delivering cervical cancer care in the private and public sector, (2) focus group discussions with health workers in primary health care clinics, and (3) photovoice study with women residing in the communities. Study findings helped identify elements of the social and cultural context of rural communities, thereby providing a rich understanding of factors influencing of cervical cancer screening that can be integrated into pre-intervention capacity development in the future.
APA, Harvard, Vancouver, ISO, and other styles
8

Dabhoiwala, Faramerz. Writing Petitions in Early Modern England. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198748267.003.0007.

Full text
Abstract:
Dabhoiwala explores the mechanics of claim-making and the emotional register in which that might be done, focusing on claims addressed not to a wide audience but to a specific and official one: he is concerned with private petitions addressed through the Master of Requests to Charles II. This channel, he argues, was primarily used by those below gentry rank. To make their case effectively, such people tended to turn to specialists with technical knowledge. Drawing on the papers of a scrivener whose services were valued, he examines how this process worked. The scrivener could advise his clients on what was expected, and in that context lived experience mattered less than its formulaic invocation.
APA, Harvard, Vancouver, ISO, and other styles
9

Romanowski, Nick. Wetland Habitats. CSIRO Publishing, 2010. http://dx.doi.org/10.1071/9780643100220.

Full text
Abstract:
Wetland Habitats is a practical and easy to use manual for wetland restoration and conservation of diverse animal species. Covering all the recent work in this field, among other significant issues it discusses making the most of dams and created wetlands; reversing the effects of drainage, grazing, weirs, deteriorating water quality, and associated algal problems; captive breeding and reintroduction; and controlling weeds and vermin. The book describes a range of potential problems encountered during restoration efforts and approaches to dealing with them, so that readers will be able to make informed decisions about wetlands on their own properties. It also explains how to set realistic targets for wetland restoration as well as longer-term goals for management, and includes colour photographs of diverse wetland habitats and the animals that rely on them. The examples draw on a wide range of wetland animals including some which aren’t often found in wetlands on private properties, but the primary emphasis is on the ecology, interactions and management of species and other aspects of management that will be of most use to landholders with wetlands in need of rejuvenation.
APA, Harvard, Vancouver, ISO, and other styles
10

Trill, Suzanne. Lay Households. Edited by Andrew Hiscock and Helen Wilcox. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199672806.013.24.

Full text
Abstract:
This chapter is primarily concerned with how devotional texts were used within lay (that is, non-clerical) households. As the household was frequently identified as ‘a little commonwealth’ such ‘private’ devotions had ‘political’ connotations, especially during a period in which officially sanctioned religious practices were continually shifting. This chapter focuses on how these changes impacted upon the devotions of three quite distinct seventeenth-century households: the controversial community established at Little Gidding by Nicholas Ferrar; the Presbyterian practice of Nehemiah Wallington’s household in Eastcheap; and, finally, the experience of Anne, Lady Halkett (née Murray) who solidly maintained her commitment to the Church of England whatever household she inhabited (whether in England or Scotland). While the differences between them are numerous, collectively these cases bear witness to the material ways in which early modern household devotions were a political minefield.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Primary User Privacy"

1

Çelik, Sabri. "The Conflict Management Styles Used by Managers of Private Primary Schools: An Example of Ankara." In Chaos, Complexity and Leadership 2013, 315–26. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09710-7_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Szewczak, Edward J. "Personal Information Privacy and Internet Technology." In Encyclopedia of Information Science and Technology, First Edition, 2272–76. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch400.

Full text
Abstract:
Concerns about the collection of personal information by Internet technology and the possibility of misuse of that information are a primary reason why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, hardware and software watermarks, and biometric devices. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly the technology is global in nature and poses challenges and issues for societies around the world.
APA, Harvard, Vancouver, ISO, and other styles
3

Warkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "Introducing the Check-Off Password System (COPS)." In End-User Computing, 81–97. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch009.

Full text
Abstract:
The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures have historically been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security provided by such a password (because they are more difficult to violate or “crack”). However, such passwords tend to be more difficult for end users to remember, particularly when the password does not spell a recognizable word (or includes non-alphanumeric characters such as punctuation marks or other symbols). Conversely, when end users select their own more easily remembered passwords, the passwords may also be easier to crack. This study presents a new approach to entering passwords, which combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords as well as high-protection, assigned-password procedures. The present study investigates trade-offs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all password procedures tested to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared with that high-security password. Further research will be conducted to investigate long-term benefits.
APA, Harvard, Vancouver, ISO, and other styles
4

Grandison, Tyrone, Pei-yun S. Hsueh, Liangzhao Zeng, Henry Chang, Yi-Hui Chen, Ci-Wei Lan, Hao-Ting (Howard) Pai, and Li-Feng Tseng. "Privacy Protection Issues for Healthcare Wellness Clouds." In Privacy Protection Measures and Technologies in Business Organizations, 227–44. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-501-4.ch009.

Full text
Abstract:
Healthcare is ubiquitous in every business organization. Whether as the primary focus of the business or as a function of the well-being of a firm’s employees, health issues play a dominant role in commerce. This recognition and the demonstrated benefits of a healthy contributor or worker have promoted a rejuvenated emphasis on wellness. In order to garner the benefits of cloud computing and foster improved employee health, the Taiwan Collaboratory is developing a first instance of a Wellness Cloud, which is an integrated, interconnected, and intelligent well-being platform. As the data held in this cloud is potentially very sensitive, the protection of this data is of utmost importance. In this chapter, we present issues and solutions for protecting user data while enabling the data to be usefully processed and for value to be derived, by using advanced technology and by harnessing the cumulative knowledge or wisdom of the collective of users.
APA, Harvard, Vancouver, ISO, and other styles
5

Sharma, Dhruti P., and Devesh C. Jinwala. "Aggregate Searchable Encryption With Result Privacy." In Research Anthology on Artificial Intelligence Applications in Security, 922–45. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch043.

Full text
Abstract:
With searchable encryption (SE), the user is allowed to extract partial data from stored ciphertexts from the storage server, based on a chosen query of keywords. A majority of the existing SE schemes support SQL search query, i.e. 'Select * where (list of keywords).' However, applications for encrypted data analysis often need to count data matched with a query, instead of data extraction. For such applications, the execution of SQL aggregate query, i.e. 'Count * where (list of keywords)' at server is essential. Additionally, in case of semi-honest server, privacy of aggregate result is of primary concern. In this article, the authors propose an aggregate searchable encryption with result privacy (ASE-RP) that includes ASearch() algorithm. The proposed ASearch() performs aggregate operation (i.e. Count *) on the implicitly searched ciphertexts (for the conjunctive query) and outputs an encrypted result. The server, due to encrypted form of aggregate result, would not be able to get actual count unless having a decryption key and hence ASearch() offers result privacy.
APA, Harvard, Vancouver, ISO, and other styles
6

Sharma, Dhruti P., and Devesh C. Jinwala. "Aggregate Searchable Encryption With Result Privacy." In Research Anthology on Artificial Intelligence Applications in Security, 922–45. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch043.

Full text
Abstract:
With searchable encryption (SE), the user is allowed to extract partial data from stored ciphertexts from the storage server, based on a chosen query of keywords. A majority of the existing SE schemes support SQL search query, i.e. 'Select * where (list of keywords).' However, applications for encrypted data analysis often need to count data matched with a query, instead of data extraction. For such applications, the execution of SQL aggregate query, i.e. 'Count * where (list of keywords)' at server is essential. Additionally, in case of semi-honest server, privacy of aggregate result is of primary concern. In this article, the authors propose an aggregate searchable encryption with result privacy (ASE-RP) that includes ASearch() algorithm. The proposed ASearch() performs aggregate operation (i.e. Count *) on the implicitly searched ciphertexts (for the conjunctive query) and outputs an encrypted result. The server, due to encrypted form of aggregate result, would not be able to get actual count unless having a decryption key and hence ASearch() offers result privacy.
APA, Harvard, Vancouver, ISO, and other styles
7

Reddy, Keesara Sravanthi. "Blockchain-Enabled Decentralization Service for Automated Parking Systems." In Advances in Data Mining and Database Management, 51–63. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3295-9.ch004.

Full text
Abstract:
Due to recent development in technology and smart devices in people's lives, their lives are becoming easier and safer. One of popular examples in todays is parking (i.e., people find free parking space without moving a long distance or consuming more time or fuel over the road network). Today many automated companies are designing vehicles, but we are still unable to get automatic parking system in an area. Finding free parking slot/space has a probability of revealing user's privacy (i.e., either by service provider to third party/attacker or submitted information [user personal information] can be hacked by an attacker [via performing attacks like Man in Middle, Denial of Service, etc.]). Hence, privacy is a main issue in parking. Providing sufficient privacy in parking to vehicle users is a primary concern of this chapter. For that, this chapter used the blockchain technology to avoid privacy issues (raised in parking searching). Blockchain technology makes reservation of parking slot transparent, decentralized, and secure (privacy-preserved).
APA, Harvard, Vancouver, ISO, and other styles
8

Warkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "A TAM Analysis of an Alternative High-Security User Authentication Procedure." In Advances in End User Computing, 280–300. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-474-3.ch014.

Full text
Abstract:
The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.
APA, Harvard, Vancouver, ISO, and other styles
9

Kakaletris, George, Dimitris Varoutas, Dimitris Katsianis, and Thomas Sphicopoulos. "Design and Implementation Approaches for Location-Based, Tourism-Related Services." In Geographic Information Systems, 258–94. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2038-4.ch018.

Full text
Abstract:
The globally observed recession of mobile services market has pushed mobile network operators into looking for opportunities to provide value added services on top of their high cost infrastructures. Recent advances in mobile positioning technologies enable services that make use of the mobile user location information, offering intuitive, attractive applications to the potential customer. Mobile tourism services are among the primary options to be considered by service providers for this new market. This chapter presents the key concepts, capabilities, and considerations of infrastructures and applications targeted to the mobile tourist, covering data and content delivery, positioning, systems’ interactions, platforms, protocols, security, and privacy as well as business modelling aspects.
APA, Harvard, Vancouver, ISO, and other styles
10

Kakaletris, George, Dimitris Varoutas, Dimitris Katsianis, and Thomas Sphicopoulos. "Design and Implementation Approaches for Location-Based, Tourism-Related Services." In Information Communication Technologies, 951–87. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-949-6.ch065.

Full text
Abstract:
The globally observed recession of mobile services market has pushed mobile network operators into looking for opportunities to provide value added services on top of their high cost infrastructures. Recent advances in mobile positioning technologies enable services that make use of the mobile user location information, offering intuitive, attractive applications to the potential customer. Mobile tourism services are among the primary options to be considered by service providers for this new market. This chapter presents the key concepts, capabilities, and considerations of infrastructures and applications targeted to the mobile tourist, covering data and content delivery, positioning, systems’ interactions, platforms, protocols, security, and privacy as well as business modelling aspects.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Primary User Privacy"

1

Rosenthal, Paul, and L. Jane Park. "Managing Information Systems Textbooks: Assessing their Orientation toward Potential General Managers." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3314.

Full text
Abstract:
This paper is an assessment of the topical coverage of current Managing Information Systems (MIS) textbooks. The MIS course is normally required of all undergraduate and graduate business majors , and therefore is their primary education in the use of IS/IT in the modern technology-oriented organization. However, the MIS textbooks researched do not attempt IS/IT management fluency. They do not even fully answer the questions normally asked by management and users during the justification and implementation of modern technology-oriented enterprise applications. The primary author has been teaching IS/IT courses for IS professionals and for users and managers for almost fifty tears. What has changed since that time? Not as much as should have happened in the education of line and staff personnel who work in organizations with critically important IS/IT enterprise applications. Early courses for users and managers were remarkably similar to our current MIS courses. This paper, therefore, suggests a significant change in content of MIS texts from primarily encompassing technology sections covering personal productivity applications, systems development methods, and infrastructure to presenting much more detail on user and management topics including modern enterprise level applications (e.g. transaction processing systems), privacy and security, feasibility studies, and the justification of IS/IT systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Bahrak, Behnam, Sudeep Bhattarai, Abid Ullah, Jung-Min Jerry Park, Jeffery Reed, and David Gurney. "Protecting the primary users' operational privacy in spectrum sharing." In 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2014. http://dx.doi.org/10.1109/dyspan.2014.6817800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Jingyi, Yanmin Gong, Lijun Qian, Riku Jaentti, Miao Pan, and Zhu Han. "Primary Users' Operational Privacy Preservation via Data-Driven Optimization." In 2017 IEEE Global Communications Conference (GLOBECOM 2017). IEEE, 2017. http://dx.doi.org/10.1109/glocom.2017.8254108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Yao, Peng Ning, and Huaiyu Dai. "Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures." In 2010 IEEE Symposium on Security and Privacy. IEEE, 2010. http://dx.doi.org/10.1109/sp.2010.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Jianqing, Chi Zhang, Haichuan Ding, Hao Yue, and Yuguang Fang. "Policy-Based Privacy-Preserving Scheme for Primary Users in Database-Driven Cognitive Radio Networks." In GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7842151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brijaková, Annamária. "Information and digital literacy of teachers in Slovakia an their adaptation on homeschooling." In Agria Média 2020 : „Az oktatás digitális átállása korunk pedagógiai forradalma”. Eszterházy Károly Egyetem Líceum Kiadó, 2021. http://dx.doi.org/10.17048/am.2020.69.

Full text
Abstract:
The pandemic situation rapidly changed the way of education throughout the whole world. Teachers had to adapt to the virtual environment and started to use new media which many of them did not know before. In Slovakia, for some of them, it was a new opportunity how to transform education into the 21st century, others saw it as a challenge for learning to use innovative methods and technologies but many teachers perceived this period as very de-manding. Differences have emerged not only between individual schools but primarily bet-ween teachers themselves. The aim of our research during the closure of the schools was to map the situation regarding teacher education in information and digital literacy and their readiness to use technologies during a pandemic situation. The research was carried out using a questionnaire method with a total of 1670 participants. It was filled in by primary and secondary school teachers, inc-luding all types of schools (public, private, church and special).
APA, Harvard, Vancouver, ISO, and other styles
7

Bonasif, Jorge. "Urban Transportation Conditions from the Metropolitan Area of Kuala Lumpur that will Impact and Endanger Putrajaya’s Sustainability Plan." In Environmental Engineering. VGTU Technika, 2017. http://dx.doi.org/10.3846/enviro.2017.101.

Full text
Abstract:
There is a growing demand for mobility and accessibility from the Klang Valley (The Greater Kuala Lumpur) into the city of Putrajaya. Putrajaya is the federal administrative Capital of Malaysia, conceived as the first sustainable intelligent city-garden. The public connectivity in Kuala Lumpur is mainly centralized with the RR (Rapid rail) integrated by the Light Rail Transit (LRT) and the MRT (Mass Rapid Transit) with connections by bus to the peripheral zones. However the primary mode of transportation is still private vehicles such as cars and motorcycles, with an increased use from 458,294 in 2006 to 628,239 in 2012. In 1990, these numbers increased from 247 vehicles per 1,000 persons to 546 and 994 vehicles per 1,000 persons in 1996 and 2002 respectively, beyond the national level per 1,000 population of 91 vehicles in 1990, 133 in 1996 and 210 vehicles in 2002 incrementing the heavily congested conditions existent in the traffic grid, thus also affecting the connection with Putrajaya (Kuala Lumpur Structured Plan 2020). This paper highlights the necessity for a closer examination to some of the factors that exert influence on the motivation of the preference in the use of private transportation in detriment of the existent public urban network that will affect and endanger the sustainable nature of Putrajaya. The primary methodology used is the consultation of available literature, newspapers, published reports, and interview with experts. A secondary source is the observation in situ to help support the conclusions. The constant growth on the demand for private transportation in the population is hypothesized to be directly positively correlated to a very ingrained tradition, unchangeable weather conditions and the unreliable connectivity. These factors directly affect the lack of incentives to improve existent public transportation from Klang Valley to Putrajaya.
APA, Harvard, Vancouver, ISO, and other styles
8

Slusareva, Elena, and Maria Plugina. "Psychological Characteristics of Inclusive Educational Environments." In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-45.

Full text
Abstract:
Inclusive education practices are now widespread in the Russian Federation and are aimed at ensuring the rights of everyone to education. One of the conditions for the effectiveness of inclusive education is the creation of an inclusive educational environment that ensures the personal and professional development of all the subjects of educational relations. Based on this, this article aims to provide a theoretical foundation and empirical investigation into the psychological characteristics of an inclusive educational environment. The following research methods were used to implement the goal: theoretical (systematic analysis of scientific and methodological literature on the research problem); empirical (experiment, interview method, method of expert evaluation); methods of primary mathematical statistics. The article covers the conception of the inclusive educational environment, thoroughly describing its constituents. The psychological characteristics of an inclusive educational environment based on the concept of psychological safety of the educational environment: attitude (positive, neutral, negative), satisfaction with interaction with the environment and subjects of educational relations, psychological safety (protection from psychological violence in the educational environment). For the empirical study of the psychological characteristics of an inclusive educational environment, an expert approach was used. The experts were the subjects of educational relations: teachers and parents, bringing up children with disabilities (sample size - 110 persons). Theoretically justified and empirically identified psychological and pedagogical conditions that ensure psychological comfort in an inclusive educational environment: the tolerance of subjects of educational relations, the professional and personal preparedness of teachers to positive interaction, parents’ readiness to build an educational route for a child with disabilities.
APA, Harvard, Vancouver, ISO, and other styles
9

Barcelos Jorge da Silveira, Victoria, Diego Moreira Souza, and Fabrício Peixoto Alvarenga. "Urban Landscape in the Historic Center of Campos dos Goytacazes:the effect of oil royalties on the use of public and private spaces between 1996 and 2020." In 7th International Congress on Scientific Knowledge. Perspectivas Online: Humanas e Sociais Aplicadas, 2021. http://dx.doi.org/10.25242/8876113220212431.

Full text
Abstract:
The analysis of space comes from its importance in people's daily lives, to carry out their optional, necessary and social activities. In addition to the geographic field, with its divisions and connections, space also influences social bonds, due to its imposition on segregating aspects imposed on society, reproducing it and supporting its relationships, being dynamic and ephemeral according to time . Thus, it is unquestionable that the historic center of a city is commonly defined by its ability to seduce its users, being a central place in relation to the rest of the built area, still remaining as commercial attraction areas and with a large number of developments. This demand causes an increase in the value of properties located in this region and also a dispute for space where the private ends up overtaking the public, for personal interests or groups of people. This dispute for space by non-equivalent forces has resulted directly in the urban landscape. The analysis of public spaces in the historic center of the city of Campos dos Goytacazes, in the period in which its budget had a high bias, especially fostered by the amounts received from the transfer of royalties for oil exploration, aims to verify the changes that occurred in these spaces. The methodology developed for this work involves the review of scientific literature, the collection of primary sources such as users, permit holders and concessionaires of public spaces and a detailed on-site survey of some urban elements such as walkways and roads;number of private spaces for vehicles, kiosks and stalls in public areas. Based on the suggested surveys, it will be possible to verify if the last relevant economic cycle that occurred in the city of Campos dos Goytacazes -the transfer of royalties for oil exploration, was responsible for the modification of the urban landscape in its Historic Center.
APA, Harvard, Vancouver, ISO, and other styles
10

Riis, Dan. "Developing Non-Gasoline Burning Outboard Motors for the UK MoD." In ASME 2005 Internal Combustion Engine Division Fall Technical Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/icef2005-1223.

Full text
Abstract:
The UK Ministry of Defence (MoD) operates a wide range of small, high performance boats, used in varying environments, and locations throughout the world. These boats primarily operate using outboard motors (OBMs) due to the optimum power to size and weight ratios they provide, and the ease of maintenance compared to inboard motor boats. The use of OBMs has, with the exception of a large and heavy 27hp diesel (compression ignition) OBM, necessitated the use of Petrol (CIVGAS - F67). This dependency evolved from the difficulty encountered developing a reliable compression ignition OBM over the full power range required (20–250hp) at acceptable power to weight/size ratios. Given the lack of a perceived market for such an engine, very little development work was done in this area in the private sector. The requirement to run OBMs on CIVGAS presents a number of problems for the MoD, including logistical, availability (especially for Special Forces), and safety (especially for HM Ships required to store the fuel on the upper decks). The Marine Propulsion Systems Integrated Project Team (MPS IPT) within MoD’s Defence Logistics Organisation (DLO), was therefore mandated to develop solutions aimed at removing MoD’s reliance on CIVGAS. This resulted in a two pronged approach investigating both micro-gas turbines and multi-fuel OBMs. This paper will present the issues encountered and the development work completed to-date developing multi-fuel reciprocating OBM technology. The primary focus has been developing direct injection, spark ignition multi-fuel OBM technology, capable of using petrol, AVTUR (F34), AVCAT (F44), diesel, and marine distillate oil (MDO - F76). The paper will discuss the project plan, the technologies involved, development work, including test and trials, and the way ahead for the future.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Primary User Privacy"

1

Punjabi, Maitri, Julianne Norman, Lauren Edwards, and Peter Muyingo. Using ACASI to Measure Gender-Based Violence in Ugandan Primary Schools. RTI Press, March 2021. http://dx.doi.org/10.3768/rtipress.2021.rb.0025.2104.

Full text
Abstract:
School-related gender-based violence (SRGBV) remains difficult to measure because of high sensitivity and response bias. However, most SRGBV measurement relies on face-to-face (FTF) survey administration, which is susceptible to increased social desirability bias. Widely used in research on sensitive topics, Audio Computer-Assisted Self-Interview (ACASI) allows subjects to respond to pre-recorded questions on a computerized device, providing respondents with privacy and confidentiality. This brief contains the findings from a large-scale study conducted in Uganda in 2019 where primary grade 3 students were randomly selected to complete surveys using either ACASI or FTF administration. The surveys covered school climate, gender attitudes, social-emotional learning, and experiences of SRGBV. Through this study, we find that although most survey responses were comparable between ACASI and FTF groups, the reporting of experiences of sexual violence differed drastically: 43% of students in the FTF group versus 77% of students in the ACASI group reported experiencing sexual violence in the past school term. We also find that factor structures are similar for data collected with ACASI compared with data collected FTF, though there is weaker evidence for construct validity for both administration modes. We conclude that ACASI is a valuable tool in measuring sensitive sub-topics of SRGBV and should be utilized over FTF administration, although further psychometric testing of these surveys is recommended.
APA, Harvard, Vancouver, ISO, and other styles
2

Schnabel, Filipina, and Danielle Aldridge. Effectiveness of EHR-Depression Screening Among Adult Diabetics in an Urban Primary Care Clinic. University of Tennessee Health Science Center, April 2021. http://dx.doi.org/10.21007/con.dnp.2021.0003.

Full text
Abstract:
Background Diabetes mellitus (DM) and depression are important comorbid conditions that can lead to more serious health outcomes. The American Diabetes Association (ADA) supports routine screening for depression as part of standard diabetes management. The PHQ2 and PHQ9 questionnaires are good diagnostic screening tools used for major depressive disorders in Type 2 diabetes mellitus (DM2). This quality improvement study aims to compare the rate of depression screening, treatment, and referral to behavioral health in adult patients with DM2 pre and post-integration of depression screening tools into the electronic health record (EHR). Methods We conducted a retrospective chart review on patients aged 18 years and above with a diagnosis of DM2 and no initial diagnosis of depression or other mental illnesses. Chart reviews included those from 2018 or prior for before integration data and 2020 to present for after integration. Sixty subjects were randomly selected from a pool of 33,695 patients in the clinic with DM2 from the year 2013-2021. Thirty of the patients were prior to the integration of depression screening tools PHQ2 and PHQ9 into the EHR, while the other half were post-integration. The study population ranged from 18-83 years old. Results All subjects (100%) were screened using PHQ2 before integration and after integration. Twenty percent of patients screened had a positive PHQ2 among subjects before integration, while 10% had a positive PHQ2 after integration. Twenty percent of patients were screened with a PHQ9 pre-integration which accounted for 100% of those subjects with a positive PHQ2. However, of the 10% of patients with a positive PHQ2 post-integration, only 6.7 % of subjects were screened, which means not all patients with a positive PHQ2 were adequately screened post-integration. Interestingly, 10% of patients were treated with antidepressants before integration, while none were treated with medications in the post-integration group. There were no referrals made to the behavior team in either group. Conclusion There is no difference between the prevalence of depression screening before or after integration of depression screening tools in the EHR. The study noted that there is a decrease in the treatment using antidepressants after integration. However, other undetermined conditions could have influenced this. Furthermore, not all patients with positive PHQ2 in the after-integration group were screened with PHQ9. The authors are unsure if the integration of the depression screens influenced this change. In both groups, there is no difference between referrals to the behavior team. Implications to Nursing Practice This quality improvement study shows that providers are good at screening their DM2 patients for depression whether the screening tools were incorporated in the EHR or not. However, future studies regarding providers, support staff, and patient convenience relating to accessibility and availability of the tool should be made. Additional issues to consider are documentation reliability, hours of work to scan documents in the chart, risk of documentation getting lost, and the use of paper that requires shredding to comply with privacy.
APA, Harvard, Vancouver, ISO, and other styles
3

Baloch, Imdad, and Abeba Taddese. EdTech in Pakistan: A Rapid Scan. EdTech Hub, June 2020. http://dx.doi.org/10.53832/edtechhub.0035.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. This includes policies, government leadership, private-sector partnerships, and digital infrastructure for education. The scans are intended to be comprehensive but are by no means exhaustive; nonetheless, we hope they will serve as a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and in this case, Pakistan. This report was originally written in June 2020. It is based primarily on desk research, with quality assurance provided by a country expert.
APA, Harvard, Vancouver, ISO, and other styles
4

Khalayleh, A., and A. Taddese. EdTech in Jordan: A Rapid Scan. EdTech Hub, June 2020. http://dx.doi.org/10.53832/edtechhub.0031.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. This includes policies, government leadership, private-sector partnerships, and digital infrastructure for education. The scans are intended to be comprehensive but are by no means exhaustive; nonetheless, we hope they will serve as a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries, in this case, in Jordan. This report was originally written in June 2020. It is based primarily on desk research, with quality assurance provided by a country expert.
APA, Harvard, Vancouver, ISO, and other styles
5

Taddese, A. EdTech in Ghana: A Rapid Scan. EdTech Hub, June 2020. http://dx.doi.org/10.53832/edtechhub.0030.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. These factors include the policy or vision for EdTech, institutional capacity, private sector partnerships, and digital infrastructure. The scans are intended to be comprehensive but are by no means exhaustive; however, we hope they will serve as a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and, in this case, Ghana. This report is based primarily on desk research, with quality assurance provided by a country expert.
APA, Harvard, Vancouver, ISO, and other styles
6

Upadhyay, Arjun, and Abeba Taddese. EdTech in Senegal: A Rapid Scan. EdTech Hub, January 2020. http://dx.doi.org/10.53832/edtechhub.0037.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. These factors include the policy or vision for EdTech, institutional capacity, private sector partnerships, and digital infrastructure. The scans are intended to be comprehensive but are by no means exhaustive. The aim is to provide a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and, in this case, Liberia. This report is based primarily on desk research, with quality assurance provided by a country expert.
APA, Harvard, Vancouver, ISO, and other styles
7

Mullan, Joel, and Abeba Taddese. EdTech in Sierra Leone: A Rapid Scan. EdTech Hub, June 2020. http://dx.doi.org/10.53832/edtechhub.0038.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. This includes policies, government leadership, private sector partnerships, and digital infrastructure for education. The scans are intended to be comprehensive but are by no means exhaustive; nonetheless, we hope they will serve as a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and in this case, in Sierra Leone. This report is based primarily on desk research, with quality assurance provided by a country expert.
APA, Harvard, Vancouver, ISO, and other styles
8

Upadhyay, Arjun, and Abeba Taddese. EdTech in Liberia: A Rapid Scan. EdTech Hub, January 2020. http://dx.doi.org/10.53832/edtechhub.0033.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. These factors include the policy or vision for EdTech, institutional capacity, private sector partnerships, and digital infrastructure. The scans are intended to be comprehensive but are by no means exhaustive. The aim is to provide a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and, in this case, Liberia. This report is based primarily on desk research, with quality assurance provided by a country expert.
APA, Harvard, Vancouver, ISO, and other styles
9

Otieno, J., and A. Taddese. EdTech in Kenya: A Rapid Scan. EdTech Hub, June 2020. http://dx.doi.org/10.53832/edtechhub.0032.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. These factors include the policy or vision for EdTech, institutional capacity, private-sector partnerships, and the digital infrastructure. The scans are intended to be comprehensive but are by no means exhaustive; however, we hope they will serve as a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and, in this case, Kenya. This report was originally written in June 2020. It is based primarily on desk research, with quality assurance provided by a country expert.
APA, Harvard, Vancouver, ISO, and other styles
10

Kimenyi, Eric, Rachel Chuang, and Abeba Taddese. EdTech in Rwanda: A Rapid Scan. EdTech Hub, June 2020. http://dx.doi.org/10.53832/edtechhub.0036.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. This includes policies, government leadership, private-sector partnerships and digital infrastructure for education. The scans are intended to be comprehensive but are by no means exhaustive; nonetheless, we hope they will serve as a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and in this case, in Rwanda. This report was originally written in June 2020. It is based primarily on desk research, with quality assurance provided by a country expert
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography