Results 51 to 60 of about 1,899,220 (174)
Analysis of Nuclear Explosion Detection Capability of IMS Hydroacoustic Network
The Comprehensive Nuclear Test Ban Treaty (CTBT) organization has established a hydroacoustic network to ensure the effective detection of nuclear explosions in the vast ocean and in the atmosphere over it in order to effectively guarantee the ...
Yan Wang+5 more
doaj +1 more source
Data protection officer in public administration [PDF]
The rapid technological development and processing of large amount of personal data have led to the need to control the processing of personal data not only by data protection supervisory authorities but also within the public administration ...
Diligenski Andrej V.
doaj
A major challenge in ecological risk assessment is estimating chemical-induced effects across taxa without species-specific testing. Where ecotoxicological data may be more challenging to gather, information on species physiology is more available for a ...
Jochen P. Zubrod+3 more
doaj
The purpose of this study is to analyze different protection mechanisms that could or should be accessed by the person entitled to the protection of personal data, to an international transfer of illegal data in order to obtain adequate protection ...
Alfonso Ortega Giménez
doaj +1 more source
Beyond consent: improving data protection through consumer protection law
As a result of datafication (the generation and acquisition of personal data from automated processes), consumers’ activities generate large data streams. Analysis of these streams reduces privacy and shifts power towards data controllers.
Michiel Rhoen
doaj +1 more source
The Mg–9Gd–3Y–2Zn–0.5Zr alloy was studied for its long-term corrosion behavior in a simulated coastal storage environment. The results show that the Mg12 (Y, Gd) Zn phase in the Mg–9Gd–3Y–2Zn–0.5Zr alloy forms a galvanic couple with α-Mg, and the Mg12 (Y,
Junhang Chen+7 more
doaj +1 more source
The Pursuit of Patterns in Educational Data Mining as a Threat to Student Privacy
Recent technological advances have led to tremendous capacities for collecting, storing and analyzing data being created at an ever-increasing speed from diverse sources.
Kyriaki H. Kyritsi+3 more
doaj +1 more source
ELSA: Efficient Long-Term Secure Storage of Large Datasets [PDF]
An increasing amount of information today is generated, exchanged, and stored digitally. This also includes long-lived and highly sensitive information (e.g., electronic health records, governmental documents) whose integrity and confidentiality must be protected over decades or even centuries.
arxiv
This article discusses the notion of the post-mortem privacy of the deceased Internet user and focuses on the post-mortem privacy protection aspects in common and continental law systems.
Asta Tūbaitė-Stalauskienė
doaj +1 more source
Crumbled Cookie Exploring E-commerce Websites Cookie Policies with Data Protection Regulations [PDF]
Despite stringent data protection regulations such as the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and other country-specific regulations, many websites continue to use cookies to track user activities.
arxiv