Academic literature on the topic 'Personal data control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Personal data control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Personal data control"

1

Hodson, Hal. "Gatekeeper keeps your personal data under your control." New Scientist 220, no. 2937 (October 2013): 20–21. http://dx.doi.org/10.1016/s0262-4079(13)62382-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Priisalu, Jaan, and Rain Ottis. "Personal control of privacy and data: Estonian experience." Health and Technology 7, no. 4 (June 15, 2017): 441–51. http://dx.doi.org/10.1007/s12553-017-0195-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ceccato, Natalie, and Courtney Price. "When personal health data is no longer “personal”." Healthcare Management Forum 32, no. 6 (August 1, 2019): 326–28. http://dx.doi.org/10.1177/0840470419865851.

Full text
Abstract:
Enacted in 2000, the Canadian Personal Health Information Protection and Electronics Documents Act is an important piece of legislation aimed at safeguarding an individual’s right to control their personal health information. Since this time, the world of data and analytics has shifted in terms of our potential to collect, integrate, and analyze both structured and unstructured data. The implications for these data advancements are endless for our healthcare system; however, challenges influenced by our approach to collecting, accessing, and analyzing data as well as patient consent to share personal health information mean public entities lag behind commercial players in harnessing these potential benefits. While there are examples of data analytics application successes, Canadian healthcare continues to lag behind other countries and commercial sectors. We are at a pivot point for system improvements requiring a collective approach to collection, storage, linkage, and application of personal healthcare data. In the chasm of this rests how we address patient consent. All health leaders can play a central role in advancing our application of data for system improvements. Strategies to support health leaders in achieving this potential are outlined in this article.
APA, Harvard, Vancouver, ISO, and other styles
4

Ruggles, Myles. "Mixed Signals: Personal Data Control in the Intelligent Network." Media Information Australia 67, no. 1 (February 1993): 28–39. http://dx.doi.org/10.1177/1329878x9306700105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Whitley, Edgar A. "Informational privacy, consent and the “control” of personal data." Information Security Technical Report 14, no. 3 (August 2009): 154–59. http://dx.doi.org/10.1016/j.istr.2009.10.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pangrazio, Luci, and Neil Selwyn. "‘Personal data literacies’: A critical literacies approach to enhancing understandings of personal digital data." New Media & Society 21, no. 2 (September 20, 2018): 419–37. http://dx.doi.org/10.1177/1461444818799523.

Full text
Abstract:
The capacity to understand and control one’s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of ‘digital literacy’ are now being usurped by concerns over citizens’ ‘data literacies’. In contrast to recent data safety and data science approaches, this article argues for a more critical form of ‘personal data literacies’ where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of ‘Personal Data Literacies’ that distinguishes five significant domains: (1) Data Identification, (2) Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The article concludes by outlining the implications of this framework for future education and research around the area of individuals’ understandings of personal data.
APA, Harvard, Vancouver, ISO, and other styles
7

Dadalko, V. A., and E. A. Timofeev. "Fundamentals of setting the compliance control of personal data protection." National Interests: Priorities and Security 16, no. 2 (February 14, 2020): 339–50. http://dx.doi.org/10.24891/ni.16.2.339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ferrandu, Giovanni. "Control and protection tools of personal data in digital healthcare." Pharmaceuticals Policy and Law 19, no. 3-4 (October 17, 2018): 209–18. http://dx.doi.org/10.3233/ppl-180457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Heaven, Douglas. "Personal clouds let you take control of your own data." New Scientist 218, no. 2919 (June 2013): 22. http://dx.doi.org/10.1016/s0262-4079(13)61363-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ragesh, G. K., and K. Baskaran. "Cryptographically Enforced Data Access Control in Personal Health Record Systems." Procedia Technology 25 (2016): 473–80. http://dx.doi.org/10.1016/j.protcy.2016.08.134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Personal data control"

1

Allwine, Daniel Alan. "Personal computer based data acquisition, sensing and control." Ohio : Ohio University, 1993. http://www.ohiolink.edu/etd/view.cgi?ohiou1174932273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Olausson, Michaela. "User control of personal data : A study of personal data management in a GDPR-compliant grahpical user interface." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-75880.

Full text
Abstract:
The following bachelor thesis explores the design of a GDPR (General Data Protection Regulation) compliant graphical user interface, for an administrative school system. The work presents the process of developing and evaluating a web-based prototype, a platform chosen because of its availability. The aim is to investigate if the design increases the caregivers perception of being in control over personal data, both their own and data related to children in their care. The methods for investigating this subject are grounded in real world research, using both quantitative and qualitative methods.   The results indicate that the users perceive the prototype to be useful, easy to use, easy to learn and that they are satisfied with it. The results also point towards the users feeling of control of both their own and their child’s personal data when using the prototype. The users agree that a higher sense of control also increases their sense of security.
APA, Harvard, Vancouver, ISO, and other styles
3

Jensen, Torstein, and Knut Halvor Larsen. "Developing Patient Controlled Access : An Access Control Model for Personal Health Records." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9597.

Full text
Abstract:

The health and social care sector has a continuous growth in the use of information technology. With more and more information about the patient stored in different systems by different health care actors, information sharing is a key to better treatment. The introduction of the personal health record aims at making this treatment process easier. In addition to being able to share information to others, the patients can also take a more active part in their treatment by communicating with participants through the system. As the personal health record is owned and controlled by the patient with assistance from health care actors, one of the keys to success lies in how the patient can control the access to the record. In this master's thesis we have developed an access control model for the personal health record in a Norwegian setting. The development is based on different studies of existing similar solutions and literature. Some of the topics we present are re-introduced from an earlier project. Interviews with potential users have also been a valuable and important source for ideas and inspiration, especially due to the fact that the access control model sets high demands on user-friendliness. As part of the access control model we have also suggested a set of key roles for the personal health record. Through a conceptual implementation we have further shown that the access control model can be implemented. Three different solutions that show the conceptual implementation in the Indivo personal health record have been suggested, using the Extensible Access Control Markup Language as the foundation.

APA, Harvard, Vancouver, ISO, and other styles
4

Yu, Sam Shaokai. "Performance analysis and call control procedures in high-speed multimedia personal wireless communications /." Title page, abstract and contents only, 1999. http://web4.library.adelaide.edu.au/theses/09PH/09phy936.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Doctoral thesis, Universitätsbibliothek Chemnitz, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-217284.

Full text
Abstract:
Web systems have become an integral part in daily life of billions of people. Social is a key characteristic today’s web projects need to feature in order to be successful in the social age. To benefit from an improved user experience, individual persons are continually invited to reveal more and more personal data to web systems. With a rising severity of attacks on web systems, it is evident that their security is inadequate for the amount of accumulated personal data. Numerous threat reports indicate that social media has become a top-ranking attack target, with climbing impacts, with ramifications beyond single individuals and with a booming black market to trade leaked personal data. To enhance information security in managing personal data by web systems for the mutual benefit of individual persons, companies and governments, this dissertation proposes a solution architecture and three research contributions. While the solution architecture establishes the foundation for a more secure management of personal data by web systems, the research contributions represent complementary components for protecting personal data against unwanted data disclosure, tampering and use without the actual data owner’s intent or knowledge. Not only do these components enable seamless integration and combination, but they also contribute to assure quality and maintainability. The dissertation concludes with discussing evaluation results and providing an outlook towards future work.
APA, Harvard, Vancouver, ISO, and other styles
6

Wild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Universitätsverlag Chemnitz, 2016. https://monarch.qucosa.de/id/qucosa%3A20629.

Full text
Abstract:
Web systems have become an integral part in daily life of billions of people. Social is a key characteristic today’s web projects need to feature in order to be successful in the social age. To benefit from an improved user experience, individual persons are continually invited to reveal more and more personal data to web systems. With a rising severity of attacks on web systems, it is evident that their security is inadequate for the amount of accumulated personal data. Numerous threat reports indicate that social media has become a top-ranking attack target, with climbing impacts, with ramifications beyond single individuals and with a booming black market to trade leaked personal data. To enhance information security in managing personal data by web systems for the mutual benefit of individual persons, companies and governments, this dissertation proposes a solution architecture and three research contributions. While the solution architecture establishes the foundation for a more secure management of personal data by web systems, the research contributions represent complementary components for protecting personal data against unwanted data disclosure, tampering and use without the actual data owner’s intent or knowledge. Not only do these components enable seamless integration and combination, but they also contribute to assure quality and maintainability. The dissertation concludes with discussing evaluation results and providing an outlook towards future work.
APA, Harvard, Vancouver, ISO, and other styles
7

Van, der Westhuizen Eldridge Welner. "A framework for personal health records in online social networking." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1012382.

Full text
Abstract:
Since the early 20th century, the view has developed that high quality health care can be delivered only when all the pertinent data about the health of a patient is available to the clinician. Various types of health records have emerged to serve the needs of healthcare providers and more recently, patients or consumers. These health records include, but are not limited to, Personal Health Records, Electronic Heath Records, Electronic Medical Records and Payer-Based Health Records. Payer-Based Health Records emerged to serve the needs of medical aids or health care plans. Electronic Medical Records and Electronic Health Records were targeted at the healthcare provider market, whereas a gap developed in the patient market. Personal Health Records were developed to address the patient market, but adoption was slow at first. The success of online social networking reignited the flame that Personal Health Records needed and online consumer-based Personal Health Records were developed. Despite all the various types of health records, there still seems to be a lack of meaningful use of personal health records in modern society. The purpose of this dissertation is to propose a framework for Personal Health Records in online social networking, to address the issue of a lack of a central, accessible repository for health records. In order for a Personal Health Record to serve this need it has to be of meaningful use. The capability of a PHR to be of meaningful use is core to this research. In order to determine whether a Personal Health Record is of meaningful use, a tool is developed to evaluate Personal Health Records. This evaluation tool takes into account all the attributes that a Personal Health Record which is of meaningful use should comprise of. Suitable ratings are allocated to enable measuring of each attribute. A model is compiled to facilitate the selection of six Personal Health Records to be evaluated. One of these six Personal Health Records acts as a pilot site to test the evaluation tool in order to determine the tool’s utility and effect improvements. The other five Personal Health Records are then evaluated to measure their adherence to the attributes of meaningful use. These findings, together with a literature study on the various types of health records and the evaluation tool, inform the building blocks used to present the framework. It is hoped that the framework for Personal Health Records in online social networking proposed in this research, may be of benefit to provide clear guidance for the achievement of a central or integrated, accessible repository for health records through the meaningful use of Personal Health Records.
APA, Harvard, Vancouver, ISO, and other styles
8

Weston, Mindy. "The Right to Be Forgotten: Analyzing Conflicts Between Free Expression and Privacy Rights." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6453.

Full text
Abstract:
As modern technology continues to affect civilization, the issue of electronic rights grows in a global conversation. The right to be forgotten is a data protection regulation specific to the European Union but its consequences are creating an international stir in the fields of mass communication and law. Freedom of expression and privacy rights are both founding values of the United States which are protected by constitutional amendments written before the internet also changed those fields. In a study that analyzes the legal process of when these two fundamental values collide, this research offers insight into both personal and judicial views of informational priority. This thesis conducts a legal analysis of cases that cite the infamous precedents of Melvin v. Reid and Sidis v. F-R Pub. Corp., to examine the factors on which U.S. courts of law determinewhether freedom or privacy rules.
APA, Harvard, Vancouver, ISO, and other styles
9

Goratti, L. (Leonardo). "Design, analysis and simulations of medium access control protocols for high and low data rate applications." Doctoral thesis, Oulun yliopisto, 2011. http://urn.fi/urn:isbn:9789514296512.

Full text
Abstract:
Abstract The past two decades have witnessed an unprecedented proliferation of mobile devices equipped with extremely innovative wireless technologies. Short range networks, such as wireless personal area networks (WPANs), wireless sensor networks (WSNs) and wireless body area networks (WBANs) have been defined and researched to deliver high speed home connectivity, environment and health monitoring. This thesis tackles design, analysis and simulation of medium access control (MAC) protocols tailored for short range networks. These have in common the use of battery operated devices but also certain design challenges connected with MAC protocols are common upon selecting the physical layer technology. Ultra wideband (UWB) technology and 60 GHz technology (which is referred to also as millimeter wave communications) are two valid examples of the wireless revolution of the past decade. Several existing standards, such as IEEE 802.15.3, ECMA-368, IEEE 802.15.4 and its amendment IEEE 802.15.4a, are considered in this thesis for MAC analysis in conjunction with UWB technology. With regard to millimeter wave communications the characteristics of the IEEE 802.15.3c standard are taken into account. Apart for the IEEE 802.15.3c all the MAC protocols have been modeled in the network simulator Opnet. One contribution of this thesis is to produce an innovative and in-depth analysis of the management aspects (e.g. ECMA-368 distributed beaconing) stemming from the above mentioned standards by means of analytical and simulation models. This study approach allows selecting the MAC features suitable for the applications and the technologies of interest. The key performance metric used to analyze all the protocols is energy efficiency, but also throughput is investigated. Another contribution brought by this thesis consists in the innovative way of studying slotted-based MAC protocols as an integrated concept connected with the type of network, the type of application and the selected physical technologies. This thesis also shows MAC performance in conjunction with UWB when false alarm, miss-detection and receiver capture (capture is modeled by means of an existing interference model) are taken into consideration. Most of the unrealistic, though common, assumptions in MAC analysis are removed and the performance of selected medical applications is evaluated through Opnet simulations. The well known binary exponential backoff is analyzed with an innovative though simplified one-dimensional Markov chain approach in the context of directional MAC for 60 GHz communications. As shown in the remainder of this thesis, the simplification introduced does not hinder the accuracy of the results, but rather allows accounting even for a finite number of retransmissions with a simple chain extension
Tiivistelmä Kahden viime vuosikymmenen aikana innovatiivisella langattomalla tekniikalla varustettujen viestintälaiteiden määrä on kasvanut räjähdysmäisesti. Lyhyen kantaman verkkoja kuten langattomia henkilökohtaisen alueen verkkoja (WPAN), langattomia anturiverkkoja (WSN) ja langattomia vartaloalueen verkkoja (WBAN) on määritelty ja tutkittu, jotta voitaisiin tuottaa korkeanopeuksisia kotiyhteyksiä sekä välineitä ympäristön ja terveydentilan seurantaan. Tämä väitöskirja käsittelee lyhyen kantaman viestintään suunniteltujen linkinohjauskerroksen MAC-protokollien suunnittelua, analysointia ja simulointia. Näissä kaikissa käytetään akkukäyttöisiä laitteita, mutta myös tietyt MAC-protokollien suunnittelun haasteet ovat tavallisia fyysisen kerroksen teknologiaa valittaessa. Ultra-laajakaistainen (UWB) teknologia ja 60 GHz teknologia (eli millimetriaallonpituusalueen tietoliikenne) ovat hyviä esimerkkejä kuluneen vuosikymmenen langattomasta vallankumouksesta. Tässä väitöskirjassa huomioidaan UWB teknologiaan liittyvää MAC-kerroksen analyysiä tehtäessä useat olemassa olevat standardit, kuten IEEE 802.15.3, ECMA-368, IEEE 802.15.4 ja sen lisäys IEEE 802.15.4a. Millimetriaallonpituusalueen tietoliikenteessä huomioidaan myös IEEE 802.15.3c standardin erityispiirteet. IEEE 802.15.3c:tä lukuun ottamatta kaikki MAC-protokollat on mallinnettu Opnet verkkosimulaattorilla. Tämä tutkimus tarjoaa innovatiivisen ja syväluotaavan tutkimuksen näiden standardien pohjalta ja analyyttisten ja simuloitujen mallien avulla kehitetyistä hallinnallisista lähestymistavoista (esim. ECMA-368 hajautettu majakkasignaali). Näiden avulla voidaan valita kohteena oleviin sovelluksiin ja teknologioihin parhaiten soveltuvia MAC-ominaisuuksia. Kaikkien protokollien analysointiin käytetty ensisijainen suorituskykymittari on energiatehokkuus, mutta myös datanopeuksia on tarkasteltu. Tässä tutkimuksessa esitellään myös innovatiivinen tapa tutkia MAC protokollia integroituina konsepteina suhteessa verkon ja sovellusten tyyppiin sekä fyysisen kerroksen teknologiaan. Lisäksi tämä väitöskirja esittelee MAC suorituskykyä UWB verkossa silloin, kun siinä otetaan huomioon väärät hälytykset, väärä havainnointi ja vastaanottimen signaalinkaappaus (vastaanoton mallintamiseksi käytetään olemassa olevaa interferenssimallia). MAC analyysistä poistetaan useimmat epärealistiset, vaikkakin tavalliset, olettamukset, ja verkkojen suorituskykyä tarkastellaan valittujen kriittisten parametrien monitoroinnissa Opnet-simulaatioiden avulla. Tunnettua binäärijakoinen eksponentiaalinen perääntyminen -algoritmia analysoidaan innovatiivisella, yksinkertaistetulla yksiulotteisella Markov-ketju -mallilla 60 GHz:n suunta-antenni MAC:n yhteydessä. Kuten tässä tutkimuksessa tullaan osoittamaan, esitelty yksinkertaistus ei rajoita tulosten tarkkuutta, vaan mukaan voidaan lukea jopa rajallinen määrä uudelleenlähetyksiä yksinkertaisen Markovin ketjun laajennuksen avulla
APA, Harvard, Vancouver, ISO, and other styles
10

Bantom, Simlindile Abongile. "Accessibility to patients’ own health information: a case in rural Eastern Cape, South Africa." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2411.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.
Access to healthcare is regarded as a basic and essential human right. It is widely known that ICT solutions have potential to improve access to healthcare, reduce healthcare cost, reduce medical errors, and bridge the digital divide between rural and urban healthcare centres. The access to personal healthcare records is, however, an astounding challenge for both patients and healthcare professionals alike, particularly within resource-restricted environments (such as rural communities). Most rural healthcare institutions have limited or non-existent access to electronic patient healthcare records. This study explored the accessibility of personal healthcare records by patients and healthcare professionals within a rural community hospital in the Eastern Cape Province of South Africa. The case study was conducted at the St. Barnabas Hospital with the support and permission from the Faculty of Informatics and Design, Cape Peninsula University of Technology and the Eastern Cape Department of Health. Semi-structured interviews, observations, and interactive co-design sessions and focus groups served as the main data collection methods used to determine the accessibility of personal healthcare records by the relevant stakeholders. The data was qualitatively interpreted using thematic analysis. The study highlighted the various challenges experienced by healthcare professionals and patients, including time-consuming manual processes, lack of infrastructure, illegible hand-written records, missing records and illiteracy. A number of recommendations for improved access to personal healthcare records are discussed. The significance of the study articulates the imperative need for seamless and secure access to personal healthcare records, not only within rural areas but within all communities.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Personal data control"

1

Ozkul, Tarik. Data acquisition and process control using personal computers. New York: Marcel Dekker, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Joseph, Babu. Real-time personal computing: For data acquisition and control. Englewood Cliffs, N.J: Prentice-Hall, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Control technology and personal computers: System design and implementation. New York: Van Nostrand Reinhold, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Personal encryption clearly explained. San Diego: AP Professional, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Property rights in personal data: A European perspective. Alphen aan den Rijn, The Netherlands: Kluwer Law International, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Protecting personal health information in Ireland: Law & practice. Cork: Oak Tree, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Steinauer, Dennis. Security of personal computer systems: A management guide. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schifreen, Robert. Data protection and security for personal computers: A manager's guide to improving the confidentiality availability and integrity of data on personal computers and local area networks. Oxford, UK: Elsevier Advanced Technology, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zimmerman, Steven M. QCPAC: Statistical quality control on the IBM PC. New York: M. Dekker, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Personal data privacy and protection in a survillance era: Technologies and practices. Hershey, PA: Information Science Reference, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Personal data control"

1

Issa, Omneya, and Jean-Charles Grégoire. "A QoS Control Scheme for Voice and Data Services in cdma2000 System." In Personal Wireless Communications, 498–504. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39867-7_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shulman, Yefim, Thao Ngo, and Joachim Meyer. "Order of Control and Perceived Control over Personal Information." In Privacy and Identity Management. Data for Better Living: AI and Privacy, 359–75. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42504-3_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gurkov, Alexander. "Personal Data Protection in Russia." In The Palgrave Handbook of Digital Russia Studies, 95–113. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42855-6_6.

Full text
Abstract:
AbstractThis chapter considers the legal framework of data protection in Russia. The adoption of the Yarovaya laws, data localization requirement, and enactment of sovereign Runet regulations allowing for isolation of the internet in Russia paint a grim representation of state control over data flows in Russia. Upon closer examination, it can be seen that the development of data protection in Russia follows many of the steps taken at the EU level, although some EU measures violated fundamental rights and were invalidated. Specific rules in this sphere in Russia are similar to the European General Data Protection Regulation. This chapter shows the special role of Roskomnadzor in forming data protection regulations by construing vaguely defined rules of legislation.
APA, Harvard, Vancouver, ISO, and other styles
4

Busacca, Angela, and Melchiorre A. Monaca. "Processing of Personal Data and AI: GDPR Guarantees and Limits (Between Individual Data and BIG DATA)." In Studies in Systems, Decision and Control, 51–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45340-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rath, Annanda Thavymony, and Jean-Noël Colin. "Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System." In Data and Applications Security and Privacy XXIX, 233–41. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20810-7_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Purevjii, Bat-Odon, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori, and Cherri M. Pancake. "Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach." In Computational Intelligence and Security, 548–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596981_81.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Buyle, Raf, Ruben Taelman, Katrien Mostaert, Geroen Joris, Erik Mannens, Ruben Verborgh, and Tim Berners-Lee. "Streamlining Governmental Processes by Putting Citizens in Control of Their Personal Data." In Communications in Computer and Information Science, 346–59. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39296-3_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Solanki, Manishkumar R. "SOLID: A Web System to Restore the Control of Users’ Personal Data." In Advances in Intelligent Systems and Computing, 257–67. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8289-9_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ursic, Helena. "The Failure of Control Rights in the Big Data Era: Does a Holistic Approach Offer a Solution?" In Personal Data in Competition, Consumer Protection and Intellectual Property Law, 55–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-57646-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zinke, Christian, Jürgen Anke, Kyrill Meyer, and Johannes Schmidt. "Modeling, Analysis and Control of Personal Data to Ensure Data Privacy – A Use Case Driven Approach." In Advances in Intelligent Systems and Computing, 87–96. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60585-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Personal data control"

1

Marques, Hugo, Hugo Carvalho, Jose Morgado, Nuno M. Garcia, Ivan Miguel Pires, and Eftim Zdravevski. "Control and Prevention of Personal Stress." In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 2020. http://dx.doi.org/10.1109/bigdata50022.2020.9378311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Muciņa, Elīna. "Data Subjects’ Control Over Their Personal Data." In The 7th International Scientific Conference of the Faculty of Law of the University of Latvia. LU Akadēmiskais apgāds, 2019. http://dx.doi.org/10.22364/iscflul.7.43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Ting, Mudhakar Srivatsa, and Ling Liu. "Fine-grained access control of personal data." In the 17th ACM symposium. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2295136.2295165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zichichi, Mirko, Stefano Ferretti, Gabriele D'Angelo, and Victor Rodriguez-Doncel. "Personal Data Access Control Through Distributed Authorization." In 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA). IEEE, 2020. http://dx.doi.org/10.1109/nca51143.2020.9306721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Almgren, R. C. "Data Acquisition And Instrument Control With Personal Computers." In Electro International, 1991. IEEE, 1991. http://dx.doi.org/10.1109/electr.1991.718288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Villegas, Wilfred, Bader Ali, and Muthucumaru Maheswaran. "An Access Control Scheme for Protecting Personal Data." In 2008 Sixth Annual Conference on Privacy, Security and Trust (PST). IEEE, 2008. http://dx.doi.org/10.1109/pst.2008.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Havur, Giray, Miel Sande, and Sabrina Kirrane. "Greater Control and Transparency in Personal Data Processing." In 6th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009143206550662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mitchell, P. D. "Effective medium access control for satellite broadband data traffic." In IEE Seminar Personal Broadband Satellite. IEE, 2002. http://dx.doi.org/10.1049/ic:20020022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Amsterdamer, Yael, and Osnat Drien. "PePPer: Fine-Grained Personal Access Control via Peer Probing." In 2019 IEEE 35th International Conference on Data Engineering (ICDE). IEEE, 2019. http://dx.doi.org/10.1109/icde.2019.00227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

CHEN, DONGMING, JIANHUA MA, RUNHE HUANG, and SONG ZHANG. "Growable Cyber I s Modeling with Increasing Personal Data." In International Conference on Advances in Computing, Control and Networking - ACCN 2015. Institute of Research Engineers and Doctors, 2015. http://dx.doi.org/10.15224/978-1-63248-038-5-84.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Personal data control"

1

Candrilli, Sean D., and Samantha Kurosky. The Response to and Cost of Meningococcal Disease Outbreaks in University Campus Settings: A Case Study in Oregon, United States. RTI Press, October 2019. http://dx.doi.org/10.3768/rtipress.2019.rr.0034.1910.

Full text
Abstract:
Invasive meningococcal disease (IMD) is a contagious bacterial infection that can occur sporadically in healthy individuals. Symptoms are typically similar to other common diseases, which can result in delayed diagnosis and treatment until patients are critically ill. In the United States, IMD outbreaks are rare and unpredictable. During an outbreak, rapidly marshalling the personnel and monetary resources to respond is paramount to controlling disease spread. If a community lacks necessary resources for a quick and efficient outbreak response, the resulting economic cost can be overwhelming. We developed a conceptual framework of activities implemented by universities, health departments, and community partners when responding to university-based IMD outbreaks. Next, cost data collected from public sources and interviews were applied to the conceptual framework to estimate the economic cost, both direct and indirect, of a university-based IMD outbreak. We used data from two recent university outbreaks in Oregon as case studies. Findings indicate a university-based IMD outbreak response relies on coordination between health care providers/insurers, university staff, media, government, and volunteers, along with many other community members. The estimated economic cost was $12.3 million, inclusive of the cost of vaccines ($7.35 million). Much of the total cost was attributable to wrongful death and indirect costs (e.g., productivity loss resulting from death). Understanding the breadth of activities and the economic cost of such a response may inform budgeting for future outbreak preparedness and development of alternative strategies to prevent and/or control IMD.
APA, Harvard, Vancouver, ISO, and other styles
2

Haddock, John E., Reyhaneh Rahbar-Rastegar, M. Reza Pouranian, Miguel Montoya, and Harsh Patel. Implementing the Superpave 5 Asphalt Mixture Design Method in Indiana. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317127.

Full text
Abstract:
Recent research developments have indicated that asphalt mixture durability and pavement life can be increased by modifying the Superpave asphalt mixture design method to achieve an in-place density of 95%, approximately 2% higher than the density requirements of conventionally designed Superpave mixtures. Doing so requires increasing the design air voids content to 5% and making changes to the mixture aggregate gradation so that effective binder content is not lowered. After successful laboratory testing of this modified mixture design method, known as Superpave 5, two controlled field trials and one full scale demonstration project, the Indiana Department of Transportation (INDOT) let 12 trial projects across the six INDOT districts based on the design method. The Purdue University research team was tasked with observing the implementation of the Superpave 5 mixture design method, documenting the construction and completing an in-depth analysis of the quality control and quality assurance (QC/QA) data obtained from the projects. QC and QA data for each construction project were examined using various statistical metrics to determine construction performance with respect to INDOT Superpave 5 specifications. The data indicate that, on average, the contractors achieved 5% laboratory air voids, which coincides with the Superpave 5 recommendation of 5%. However, on average, the as-constructed mat density of 93.8% is roughly 1% less than the INDOT Superpave 5 specification. It is recommended that INDOT monitor performance of the Superpave 5 mixtures and implement some type of additional training for contractor personnel, in order to help them increase their understanding of Superpave 5 concepts and how best to implement the design method in their operation.
APA, Harvard, Vancouver, ISO, and other styles
3

Stall, Nathan M., Kevin A. Brown, Antonina Maltsev, Aaron Jones, Andrew P. Costa, Vanessa Allen, Adalsteinn D. Brown, et al. COVID-19 and Ontario’s Long-Term Care Homes. Ontario COVID-19 Science Advisory Table, January 2021. http://dx.doi.org/10.47326/ocsat.2021.02.07.1.0.

Full text
Abstract:
Key Message Ontario long-term care (LTC) home residents have experienced disproportionately high morbidity and mortality, both from COVID-19 and from the conditions associated with the COVID-19 pandemic. There are several measures that could be effective in preventing COVID-19 outbreaks, hospitalizations, and deaths in Ontario’s LTC homes, if implemented. First, temporary staffing could be minimized by improving staff working conditions. Second, homes could be further decrowded by a continued disallowance of three- and four-resident rooms and additional temporary housing for the most crowded homes. Third, the risk of SARS-CoV-2 infection in staff could be minimized by approaches that reduce the risk of transmission in communities with a high burden of COVID-19. Summary Background The Province of Ontario has 626 licensed LTC homes and 77,257 long-stay beds; 58% of homes are privately owned, 24% are non-profit/charitable, 16% are municipal. LTC homes were strongly affected during Ontario’s first and second waves of the COVID-19 pandemic. Questions What do we know about the first and second waves of COVID-19 in Ontario LTC homes? Which risk factors are associated with COVID-19 outbreaks in Ontario LTC homes and the extent and death rates associated with outbreaks? What has been the impact of the COVID-19 pandemic on the general health and wellbeing of LTC residents? How has the existing Ontario evidence on COVID-19 in LTC settings been used to support public health interventions and policy changes in these settings? What are the further measures that could be effective in preventing COVID-19 outbreaks, hospitalizations, and deaths in Ontario’s LTC homes? Findings As of January 14, 2021, a total of 3,211 Ontario LTC home residents have died of COVID-19, totaling 60.7% of all 5,289 COVID-19 deaths in Ontario to date. There have now been more cumulative LTC home outbreaks during the second wave as compared with the first wave. The infection and death rates among LTC residents have been lower during the second wave, as compared with the first wave, and a greater number of LTC outbreaks have involved only staff infections. The growth rate of SARS-CoV-2 infections among LTC residents was slower during the first two months of the second wave in September and October 2020, as compared with the first wave. However, the growth rate after the two-month mark is comparatively faster during the second wave. The majority of second wave infections and deaths in LTC homes have occurred between December 1, 2020, and January 14, 2021 (most recent date of data extraction prior to publication). This highlights the recent intensification of the COVID-19 pandemic in LTC homes that has mirrored the recent increase in community transmission of SARS-CoV-2 across Ontario. Evidence from Ontario demonstrates that the risk factors for SARS-CoV-2 outbreaks and subsequent deaths in LTC are distinct from the risk factors for outbreaks and deaths in the community (Figure 1). The most important risk factors for whether a LTC home will experience an outbreak is the daily incidence of SARS-CoV-2 infections in the communities surrounding the home and the occurrence of staff infections. The most important risk factors for the magnitude of an outbreak and the number of resulting resident deaths are older design, chain ownership, and crowding. Figure 1. Anatomy of Outbreaks and Spread of COVID-19 in LTC Homes and Among Residents Figure from Peter Hamilton, personal communication. Many Ontario LTC home residents have experienced severe and potentially irreversible physical, cognitive, psychological, and functional declines as a result of precautionary public health interventions imposed on homes, such as limiting access to general visitors and essential caregivers, resident absences, and group activities. There has also been an increase in the prescribing of psychoactive drugs to Ontario LTC residents. The accumulating evidence on COVID-19 in Ontario’s LTC homes has been leveraged in several ways to support public health interventions and policy during the pandemic. Ontario evidence showed that SARS-CoV-2 infections among LTC staff was associated with subsequent COVID-19 deaths among LTC residents, which motivated a public order to restrict LTC staff from working in more than one LTC home in the first wave. Emerging Ontario evidence on risk factors for LTC home outbreaks and deaths has been incorporated into provincial pandemic surveillance tools. Public health directives now attempt to limit crowding in LTC homes by restricting occupancy to two residents per room. The LTC visitor policy was also revised to designate a maximum of two essential caregivers who can visit residents without time limits, including when a home is experiencing an outbreak. Several further measures could be effective in preventing COVID-19 outbreaks, hospitalizations, and deaths in Ontario’s LTC homes. First, temporary staffing could be minimized by improving staff working conditions. Second, the risk of SARS-CoV-2 infection in staff could be minimized by measures that reduce the risk of transmission in communities with a high burden of COVID-19. Third, LTC homes could be further decrowded by a continued disallowance of three- and four-resident rooms and additional temporary housing for the most crowded homes. Other important issues include improved prevention and detection of SARS-CoV-2 infection in LTC staff, enhanced infection prevention and control (IPAC) capacity within the LTC homes, a more balanced and nuanced approach to public health measures and IPAC strategies in LTC homes, strategies to promote vaccine acceptance amongst residents and staff, and further improving data collection on LTC homes, residents, staff, visitors and essential caregivers for the duration of the COVID-19 pandemic. Interpretation Comparisons of the first and second waves of the COVID-19 pandemic in the LTC setting reveal improvement in some but not all epidemiological indicators. Despite this, the second wave is now intensifying within LTC homes and without action we will likely experience a substantial additional loss of life before the widespread administration and time-dependent maximal effectiveness of COVID-19 vaccines. The predictors of outbreaks, the spread of infection, and deaths in Ontario’s LTC homes are well documented and have remained unchanged between the first and the second wave. Some of the evidence on COVID-19 in Ontario’s LTC homes has been effectively leveraged to support public health interventions and policies. Several further measures, if implemented, have the potential to prevent additional LTC home COVID-19 outbreaks and deaths.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography