Academic literature on the topic 'Privacy leak'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy leak.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Privacy leak"

1

Fan, Le-Jun, Yuan-Zhuo Wang, Jing-Yuan Li, Xue-Qi Cheng, and Chuang Lin. "Privacy Petri Net and Privacy Leak Software." Journal of Computer Science and Technology 30, no. 6 (2015): 1318–43. http://dx.doi.org/10.1007/s11390-015-1601-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fan, Lejun, Yuanzhuo Wang, Xiaolong Jin, Jingyuan Li, Xueqi Cheng, and Shuyuan Jin. "Comprehensive Quantitative Analysis on Privacy Leak Behavior." PLoS ONE 8, no. 9 (2013): e73410. http://dx.doi.org/10.1371/journal.pone.0073410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Valecha, Rohit, Shambhu Upadhyaya, and H. Raghav Rao. "An Activity Theory Approach to Leak Detection and Mitigation in Patient Health Information (PHI)." Journal of the Association for Information Systems 22, no. 4 (2021): 1007–36. http://dx.doi.org/10.17705/1jais.00687.

Full text
Abstract:
The migration to electronic health records (EHR) in the healthcare industry has raised issues with respect to security and privacy. One issue that has become a concern for healthcare providers, insurance companies, and pharmacies is patient health information (PHI) leaks because PHI leaks can lead to violation of privacy laws, which protect the privacy of individuals’ identifiable health information, potentially resulting in a healthcare crisis. This study explores the issue of PHI leaks from an access control viewpoint. We utilize access control policies and PHI leak scenarios derived from se
APA, Harvard, Vancouver, ISO, and other styles
4

Jing, Tao, Qiancheng Chen, and Yingkun Wen. "A Probabilistic Privacy Preserving Strategy for Word-of-Mouth Social Networks." Wireless Communications and Mobile Computing 2018 (July 8, 2018): 1–12. http://dx.doi.org/10.1155/2018/6031715.

Full text
Abstract:
An online social network (OSN) is a platform that makes people communicate with friends, share messages, accelerate business, and enhance teamwork. In the OSN, privacy issues are increasingly concerned, especially in private message leaks in word-of-mouth. A user’s privacy may be leaked out by acquaintances without user’s consent. In this paper, an integrated system is designed to prevent this illegal privacy leak. In particular, we only use the method of space vector model to determine whether the user’s private message is really leaked. Canary traps techniques are used to detect leakers. The
APA, Harvard, Vancouver, ISO, and other styles
5

Luo, Xiaohui. "A Method for Privacy-Safe Synthetic Health Data." Academic Journal of Science and Technology 10, no. 1 (2024): 445–50. http://dx.doi.org/10.54097/f7fjss40.

Full text
Abstract:
Private health records are important for medical research but hard to get because of legal rules. This shortage of data can be solved by using generative models like GANs, which make new, similar data. But GANs might leak private information. To fix this, we made a new kind of GAN with a privacy protection part called DP-ACTGAN. It uses differential privacy to keep the original data safe. We also put a classifier in the GAN to make sure the new data is very close to the real data. Experiments show that DP-ACTGAN can make good quality data without giving away private information. This means we
APA, Harvard, Vancouver, ISO, and other styles
6

Tandon, Rajat, Pithayuth Charnsethikul, Ishank Arora, Dhiraj Murthy, and Jelena Mirkovic. "I know what you did on Venmo: Discovering privacy leaks in mobile social payments." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 200–221. http://dx.doi.org/10.56553/popets-2022-0069.

Full text
Abstract:
Venmo is a US-based mobile social payments platform. Each Venmo transaction requires a “payment note”, a brief memo. By default, these memos are visible to all other Venmo users. Using three data sets of Venmo transactions, which span 8 years and a total of 389 M transactions with over 22.5 M unique users, we quantify the extent of private data leaks from public transaction notes. To quantify the leaks, we develop a classification framework SENMO, that uses BERT and regular expressions to classify public transaction notes as sensitive or non-sensitive. We find that 41 M notes (10.5%) leak some
APA, Harvard, Vancouver, ISO, and other styles
7

Vivekanandam, B., and Midhunchakkaravarthy. "Preventive Measures for the Impacts of Social Media Networks in Security and Privacy - A Review." Journal of ISMAC 3, no. 4 (2022): 291–300. http://dx.doi.org/10.36548/jismac.2021.4.001.

Full text
Abstract:
Recently, smartphones have made it simpler than ever, to access social networking sites, which have become an integral part of our daily lives. However, safety and privacy are still major concerns. User-shared material, such as images, movies, and audio recordings may provide several safety and privacy concerns. Especially when the user uploads sensitive content, the attacker has the ability to misuse the information. If minors are targeted, the dangers are significantly greater. This study examines how data breaches or leaks impact the community and how security and privacy are compromised. A
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Xiaolei, and Yuexiang Yang. "PrivacyContext: identifying malicious mobile privacy leak using program context." International Journal of Information and Computer Security 11, no. 6 (2019): 562. http://dx.doi.org/10.1504/ijics.2019.10024486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Xiaolei, and Yuexiang Yang. "PrivacyContext: identifying malicious mobile privacy leak using program context." International Journal of Information and Computer Security 11, no. 6 (2019): 562. http://dx.doi.org/10.1504/ijics.2019.103054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Heeger, Julian, Simon Bugert, Waldemar Berchtold, Alexander Gruler, and Martin Steinebach. "Privacy preserving leak detection in peer-to-peer communication." Electronic Imaging 35, no. 4 (2023): 377——1–377–6. http://dx.doi.org/10.2352/ei.2023.35.4.mwsf-377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Privacy leak"

1

Abid, Younes. "Analyse automatisée des risques sur la vie privée dans les réseaux sociaux." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088/document.

Full text
Abstract:
Cette thèse vise à comprendre le risque de fuite d’informations personnelles sur un réseau social. Nous étudions les violations potentielles de la vie privée, concevons des attaques, prouvons leur faisabilité et analysons leur précision. Cette approche nous aide à identifier l’origine des menaces et constitue un premier pas vers la conception de contre-mesures efficaces. Nous avons d’abord introduit une mesure de sensibilité des sujets à travers une enquête par questionnaire. Puis, nous avons conçu des attaques de divulgation (avec certitude) des liens d’amitié et des liens d’appartenance aux
APA, Harvard, Vancouver, ISO, and other styles
2

Abid, Younes. "Analyse automatisée des risques sur la vie privée dans les réseaux sociaux." Electronic Thesis or Diss., Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088.

Full text
Abstract:
Cette thèse vise à comprendre le risque de fuite d’informations personnelles sur un réseau social. Nous étudions les violations potentielles de la vie privée, concevons des attaques, prouvons leur faisabilité et analysons leur précision. Cette approche nous aide à identifier l’origine des menaces et constitue un premier pas vers la conception de contre-mesures efficaces. Nous avons d’abord introduit une mesure de sensibilité des sujets à travers une enquête par questionnaire. Puis, nous avons conçu des attaques de divulgation (avec certitude) des liens d’amitié et des liens d’appartenance aux
APA, Harvard, Vancouver, ISO, and other styles
3

Farrell-Poe, Kitt, Lisa Jones-McLean, and Scott McLean. "Lead in Private Water Wells." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2010. http://hdl.handle.net/10150/156927.

Full text
Abstract:
2 pp.<br>1. Drinking Water Wells; 2. Private Water Well Components; 3. Do Deeper Wells Mean Better Water; 4. Maintaining Your Private Well Water System; 5. Private Well Protection; 6. Well Water Testing and Understanding the Results; 7. Obtaining a Water Sample for Bacterial Analysis; 8. Microorganisms in Private Water Wells; 9. Lead in Private Water Wells; 10. Nitrate in Private Water Wells; 11.Arsenic in Private Water Wells; 12. Matching Drinking Water Quality Problems to Treatment Methods; 13. Commonly Available Home Water Treatment Systems; 14. Hard Water: To Soften or Not to Soften; 15. S
APA, Harvard, Vancouver, ISO, and other styles
4

Pieper, Kelsey J. "Characterizing Waterborne Lead in Private Water Systems." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/74273.

Full text
Abstract:
Lead is a common additive in plumbing components despite its known adverse health effects. Recent research has attributed cases of elevated blood lead levels in children and even fetal death with the consumption of drinking water containing high levels of lead. Although the federal Environmental Protection Agency (USEPA) strives to minimize lead exposure from water utilities through the Lead and Copper Rule (LCR), an estimated 47 million U.S. residents reliant on private unregulated water systems (generally individual and rural) are not protected. Detection, evaluation, and mitigation of lead
APA, Harvard, Vancouver, ISO, and other styles
5

Olejnik, Lukasz. "Measuring the Privacy Risks and Value of Web Tracking." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GRENM002.

Full text
Abstract:
Les nouvelles technologies introduisent de nouveaux problèmes et risques. Par exemple, les internautes sont constamment tracés et profilés sur l'Internet. Ce profilage permet aux divers sites de personaliser et ainsi d'améliorer le service qu'ils fournissent à chaque internaute. Cependant ce profilage introduit aussi des problèmes d'intimité et de protection de la vie privée. Il est d'ailleurs reconnu que ces données personnelles sont souvent échangées, voire vendues, et qu'il existe une vraie economie des données personnelles. Cet thèse étudie comment ces données personnelles, et en particuli
APA, Harvard, Vancouver, ISO, and other styles
6

Malek, Ramtin. "Lean principles application in public-private partnership project procurement." Bowling Green State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1394924437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Curi, Isadora Volpato. "Juristas e o Regime Militar (1964-1985): atuação de Victor Nunes Leal no STF e de Raymundo Faoro na OAB." Universidade de São Paulo, 2008. http://www.teses.usp.br/teses/disponiveis/8/8138/tde-21012009-104742/.

Full text
Abstract:
O presente trabalho consiste no estudo da atuação de dois juristas no contexto do regime militar brasileiro (1964-1985): Victor Nunes Leal, ministro do Supremo Tribunal Federal (STF), foi aposentado compulsoriamente em janeiro de 1969, em decorrência do Ato Institucional n° 5/1968; Raymundo Faoro, presidente do Conselho Federal da Ordem dos Advogados do Brasil (OAB) entre 1977-1979, tornou-se importante interlocutor da sociedade civil com o Governo Geisel, pelo retorno da democracia. As obras dos dois juristashistoriadores, respectivamente Coronelismo, enxada e voto: o município e o regime rep
APA, Harvard, Vancouver, ISO, and other styles
8

Coster, Coenraad Jorke, and Wijk Sjoerd Van. "Lean project management : An exploratory research into lean project management in the Swedish public and private sector." Thesis, Umeå universitet, Företagsekonomi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-108020.

Full text
Abstract:
This study looks at the differences in lean project management between projects done in the public sector and projects done in the private sector. The private sector consist of companies around Sweden, while municipalities are representing the public sector in this study. This study is based on the understanding that the lean philosophy can have advantages for the efficiency of project management, both for the private and the public sector, knowing that there are differences in the nature of these organizations. This thesis begins with an introduction that explains the theory that is important
APA, Harvard, Vancouver, ISO, and other styles
9

Siqueiros, José Luis. "ROBERTO MAC LEAN. Las Personas Jurídicas en el Derecho Internacional Privado. Lima. 1963." Pontificia Universidad Católica del Perú, 2015. http://repositorio.pucp.edu.pe/index/handle/123456789/116711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kaukonen, Ulla Haapanen Heta-Liisa. "To lead or to follow? : a case study of an internationalization process /." Uppsala : Uppsala University. Department of Business Studies, 2008. http://www.diva-portal.org/smash/get/diva2:132312/FULLTEXT01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Privacy leak"

1

Liu, Wen Ming, and Lingyu Wang. Preserving Privacy Against Side-Channel Leaks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42644-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bruijn, Hans. The Governance of Privacy. Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9789463729673.

Full text
Abstract:
We can hardly underestimate the importance of privacy in our data-driven world. Privacy breaches are not just about disclosing information. Personal data is used to profile and manipulate us – sometimes on such a large scale that it affects society as a whole. What can governments do to protect our privacy? In The Governance of Privacy Hans de Bruijn first analyses the complexity of the governance challenge, using the metaphor of a journey. At the start, users have strong incentives to share data. Harvested data continue the journey that might lead to a privacy breach, but not necessarily – it
APA, Harvard, Vancouver, ISO, and other styles
3

Boyle, Alistair. What now, King Lear?: A Gil Yates private investigator novel. Allen A. Knoll, Publishers, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cook, Glen. Angry Lead Skies. Roc, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ed, Goodgold, ed. The armchair conductor: How to lead a symphony orchestrain the privacy of your own home. Titan, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Amerasinghe, Nihal. Losing the lead role: Has private capital flows edged out ODA? Gov. Jose B. fernances Jr. Center for Banking and Finance, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Leap of faith: A Blaine Stewart mystery. Dutton, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ana, Branco, and Caixa Cultural Rio de Janeiro, eds. Fotografia brasileira contemporânea na Coleção Carlos Leal. Francisco Alves, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

David, Butcher. Pages from presses: Kelmscott, Ashendene, Doves, Vale, Eragny & Essex House. Whittington Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

ill, Smith Jamie, and Preller James, eds. The case of the four-leaf clover. Scholastic, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Privacy leak"

1

Wijaya, Dimaz Ankaa, Joseph K. Liu, Ron Steinfeld, and Dongxi Liu. "Transparency or Anonymity Leak: Monero Mining Pools Data Publication." In Information Security and Privacy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90567-5_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Negre, Christophe, and Guilherme Perin. "Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS." In Information Security and Privacy. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19962-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Slokom, Manel, Peter-Paul de Wolf, and Martha Larson. "When Machine Learning Models Leak: An Exploration of Synthetic Training Data." In Privacy in Statistical Databases. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13945-1_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Prior, Suzanne, and Natalie Coull. "Parents Unwittingly Leak Their Children’s Data: A GDPR Time Bomb?" In HCI for Cybersecurity, Privacy and Trust. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50309-3_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jain, Vineeta, Vijay Laxmi, Manoj Singh Gaur, and Mohamed Mosbah. "APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7561-3_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liang, Hongliang, Yudong Wang, Tianqi Yang, and Yue Yu. "AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications." In Secure IT Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03638-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bakas, Alexandros, and Antonis Michalas. "Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme." In Data and Applications Security and Privacy XXXV. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81242-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Chungha, Kangsoo Jung, and Seog Park. "A Method of Pre-detecting Privacy Leak in Social Network Service Using Collaborative Filtering." In Database Systems for Advanced Applications. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40270-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Zhizhou, and Ten H. Lai. "$$\delta $$-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67816-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Soroush, Hamed, Keen Sung, Erik Learned-Miller, Brian Neil Levine, and Marc Liberatore. "Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet." In Privacy Enhancing Technologies. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39077-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Privacy leak"

1

Shuba, Anastasia, Evita Bakopoulou, and Athina Markopoulou. "Privacy Leak Classification on Mobile Devices." In 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 2018. http://dx.doi.org/10.1109/spawc.2018.8445948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Deodhar, Leena, Dinil Mon Divakaran, and Mohan Gurusamy. "Analysis of Privacy Leak on Twitter." In 2017 IEEE Global Communications Conference (GLOBECOM 2017). IEEE, 2017. http://dx.doi.org/10.1109/glocom.2017.8254496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fan, Lejun, Yuanzhuo Wang, Xueqi Cheng, and Shuyuan Jin. "Quantitative analysis for privacy leak software with privacy Petri net." In the ACM SIGKDD Workshop. ACM Press, 2012. http://dx.doi.org/10.1145/2331791.2331798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Xiaolei, Yuexiang Yang, Chuan Tang, Yingzhi Zeng, and Jie He. "DroidContext: Identifying Malicious Mobile Privacy Leak Using Context." In 2016 IEEE Trustcom/BigDataSE/I​SPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

He, Xinglu, Kai Lu, and Gen Li. "Taint Reverse Propagation for Analysis of Privacy Leak." In 2016 IEEE Trustcom/BigDataSE/I​SPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schindler, Christian, Muslum Atas, Thomas Strametz, Johannes Feiner, and Reinhard Hofer. "Privacy Leak Identification in Third-Party Android Libraries." In 2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ). IEEE, 2022. http://dx.doi.org/10.1109/mobisecserv50855.2022.9727217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Leu, Patrick, Ivan Puddu, Aanjhan Ranganathan, and Srdjan Čapkun. "I Send, Therefore I Leak." In WiSec '18: 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, 2018. http://dx.doi.org/10.1145/3212480.3212508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Dongyao, Mert D. Pesé, and Kang G. Shin. "Guess Which Car Type I Am Driving: Information Leak via Driving Apps." In Inaugural International Symposium on Vehicle Security & Privacy. Internet Society, 2023. http://dx.doi.org/10.14722/vehiclesec.2023.23048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yue, Jiarui, Yajuan Qin, Shuai Gao, Wei Su, Guobiao He, and Ningchun Liu. "A Privacy-Preserving Route Leak Protection Mechanism Based on Blockchain." In 2021 IEEE International Conference on Information Communication and Software Engineering (ICICSE). IEEE, 2021. http://dx.doi.org/10.1109/icicse52190.2021.9404125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, Yifan. "An Automated Pipeline for Privacy Leak Analysis of Android Applications." In 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2021. http://dx.doi.org/10.1109/ase51524.2021.9678875.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Privacy leak"

1

Arnold, Zachary, Ilya Rahkovsky, and Tina Huang. Tracking AI Investment: Initial Findings From the Private Markets. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/20190011.

Full text
Abstract:
The global AI industry is booming, with privately held firms pulling in nearly $40 billion in disclosed investment in 2019 alone. U.S. companies continue to attract the majority of that funding—64 percent of it in 2019—but that lead is not guaranteed. This report analyzes AI investment data from 2015 to 2019 to help better understand trends in the global AI landscape.
APA, Harvard, Vancouver, ISO, and other styles
2

Agüero, Jorge M., and Verónica Frisancho. Systematic Bias in Sensitive Health Behaviors and Its Impact on Treatment Effects: An Application to Violence against Women. Inter-American Development Bank, 2017. http://dx.doi.org/10.18235/0007031.

Full text
Abstract:
Violence against women takes place mainly in the private sphere and isperpetrated by people close to the victim. These features can introduce large biases into its reporting in specialized surveys as well as to the authorities. We test for the existence of measurement error in the reporting of such violence using experimental methods in Peru, a country with several specialized surveys but one lacking reliable administrative data. We ask women to report past experiences of violent acts by randomly assigning them one of two questionnaires, one that replicates current surveys and another that rel
APA, Harvard, Vancouver, ISO, and other styles
3

Straume, Odd Rune, and Paulo Bastos. Preschool Education in Brazil: Does Public Supply Crowd Out Private Enrollment? Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0011518.

Full text
Abstract:
This paper examines whether an expansion in the supply of public preschool crowds out private enrollment, using rich data for municipalities in Brazil from 2000-2006, where federal transfers to local governments change discontinuously with given population thresholds. Results from a regression-discontinuity design reveal that larger federal transfers lead to a significant expansion of local public preschool services, but show no effects on the quantity or quality of private provision. These findings are consistent with a theory in which households differ in willingness to pay for preschool ser
APA, Harvard, Vancouver, ISO, and other styles
4

Okwundu, Charles I., and Charles Shey Wiysonge. Which interventions improve the management of dual practice? SUPPORT, 2016. http://dx.doi.org/10.30846/160811.

Full text
Abstract:
Dual practice in the healthcare setting refers to the holding of more than one job, in unrelated health facilities, by a health professional. In many low-income countries, low pay and difficult working conditions lead many health professionals in the public sector to add to their income by taking on private patients who pay for the services that they receive. Dual practice has both negative and positive consequences and there are concerns that its negative impacts may exceed the positive ones. By allowing public sector workers to supplement their income, it may be easier for the public health
APA, Harvard, Vancouver, ISO, and other styles
5

Ameri, Samuel, and Patrick Szary. PB2006105744 Needs for Oil and Gas Pipeline Safety and Security. Pipeline Research Council International, Inc. (PRCI), 2005. http://dx.doi.org/10.55274/r0012127.

Full text
Abstract:
Pipelines are by far the most important mode of petroleum transportation in the United States because of their remarkable efficiency and low transportation cost. Pipelines carry two-thirds of the energy consumed by our nation and are recognized as the safest and most economical way to distribute vast quantities of oil and gas from production fields to refineries to consumers for a foreseeable future. This sophisticated network of gathering and distribution systems comprises 2.3 million miles of pipelines-varying in size from 2 inches to 60 inches in diameter. Pipelines are vital to a nation's
APA, Harvard, Vancouver, ISO, and other styles
6

Dukarski, Jennifer. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles. SAE International, 2021. http://dx.doi.org/10.4271/epr2021019.

Full text
Abstract:
Modern automobiles collect around 25 gigabytes of data per hour and autonomous vehicles are expected to generate more than 100 times that number. In comparison, the Apollo Guidance Computer assisting in the moon launches had only a 32-kilobtye hard disk. Without question, the breadth of in-vehicle data has opened new possibilities and challenges. The potential for accessing this data has led many entrepreneurs to claim that data is more valuable than even the vehicle itself. These intrepid data-miners seek to explore business opportunities in predictive maintenance, pay-as-you-drive features,
APA, Harvard, Vancouver, ISO, and other styles
7

Bassi, Marina, and Catalina Covacevich. Briefly Noted: No. 19: July 2012: How Can We Bring the Best Talent to the Classroom? Preliminary Results of Elige Educar. Inter-American Development Bank, 2012. http://dx.doi.org/10.18235/0008197.

Full text
Abstract:
Elige Educar is a Chilean public-private initiative that seeks to improve the appreciation of teachers and encourage high-performing students to study education by means of media campaigns, talks to secondary school students and scholarships to study education. This bulletin summarizes the preliminary results, which are encouraging and lead us to believe that, through programs like this, it is possible to improve the social value given to teachers and to change the academic profile of future teachers in the region.
APA, Harvard, Vancouver, ISO, and other styles
8

Albornoz, Facundo, Guillermo Cruces, and María Lombardi. Trusting Covid-19 recommendations: The role of experts, markets and governments. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005097.

Full text
Abstract:
Do individuals trust experts' advice? Does the sector represented by these experts matter for trust and compliance? Do individuals prefer the public or the private sector for large-scale responses to events such as the pandemic? We answer these questions by means of a large-scale survey on a representative sample of 9,444 respondents from Argentina, Bolivia, Colombia, Ecuador, Mexico, Peru and Uruguay. We study if opinions on risk-mitigating actions against Covid-19 are shaped by expert recommendations and the sectors they represent. We identify a backlash against experts' recommendations that
APA, Harvard, Vancouver, ISO, and other styles
9

Micco, Alejandro, Eduardo Levy Yeyati, and Ugo Panizza. Should the Government Be in the Banking Business?: The Role of State-Owned and Development Banks. Inter-American Development Bank, 2004. http://dx.doi.org/10.18235/0010834.

Full text
Abstract:
This paper surveys the theoretical and empirical literature on the role of state-owned banks and also presents some new results and a robustness analysis. The paper shows that state-owned banks located in developing countries have fiscal costs because they are characterized by lower returns than comparable privately owned banks (on the other hand, there is no evidence that state-owned banks located in industrial countries are less profitable than their private counterparts). We then point out that this evidence cannot be used as an argument against the existence of state-owned banks, as this l
APA, Harvard, Vancouver, ISO, and other styles
10

Ribeiro, João A., Paulo J. Pereira, and Elísio M. Brandão. A real options model to determine the optimal contractual penalty for a BOT project. CICEE. Universidade Autónoma de Lisboa, 2021. http://dx.doi.org/10.26619/ual-cicee/wp06.2021.

Full text
Abstract:
Public-Private Partnerships (PPP) became one of the most common types of public procurement arrangements and Build-Own-Transfer (BOT) projects, awarded through adequate bidding competitions, have been increasingly promoted by governments. The theoretical model herein proposed is based on a contractual framework where the government grants leeway to the private entity regarding the timing for project implementation. However, the government is aware that delaying the beginning of operations will lead to the emergence of social costs, i.e., the costs that result from the corresponding loss of soc
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!