Academic literature on the topic 'Right to use information'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Right to use information.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Right to use information"

1

Nataliia, Kushakova-Kostytska. "INFORMATION AND THE RIGHT TO INFORMATION: DEFINITION ISSUES AND REASONABLE RESTRICTIONS ON USE." Scientific and informational bulletin of Ivano-Frankivsk University of Law named after King Danylo Halytskyi, no. 19(31) (June 13, 2025): 152–62. https://doi.org/10.33098/2078-6670.2025.19.31.152-162.

Full text
Abstract:
Purpose. The purpose of the work is to analyze the human right to information and its possible restrictions at the constitutional and regulatory levels, their legality and feasibility in Ukraine in today's conditions. Methodology. The research methodology is focused on a comprehensive, interdisciplinary approach to the analysis of the concepts of "information" and "right to information" based on scientific research, regulatory and other documents. The work used methods of synthesis and analysis of scientific achievements in the analysis of the concept of "information", as well as systemic and comparative methods in the study of the concept of "right to information". Results: The paper explores various aspects of the concept of information in the context of legal regulation of the right to information and its possible limitations. The regulation of the right to information in national legislation, its content and structure are analyzed, and the definitions of its components are formulated. It has been established that since the beginning of the 21st century, there has been an exclusively digital orientation in the development of human information rights, which is associated with the development of digitalization of all spheres of life and the need to make appropriate changes to the legislation in general and changes to individual norms regarding the use of information in various branches of law in particular. This also applies to the rethinking and updating of legal norms related to the regulation of the right to information and its restrictions, which are influenced not only by technological development, but also by social changes - crisis situations, in particular, military conflicts. It is summarized that the further democratization of the Ukrainian state depends on the effective resolution of the issue of the implementation and protection of the right to information. Originality. The research identified certain inconsistencies in the regulation of the right to information in various regulatory legal acts and indicated ways to eliminate them. The emphasis was placed on the need to take into account the specifics of the implementation of the right to information and its restrictions during martial law and post-war reconstruction in Ukraine. Practical significance. The results of the study can be used in law-making and law enforcement activities during the consideration of court cases related to the violation of citizens' information rights, in particular their unlawful restriction.
APA, Harvard, Vancouver, ISO, and other styles
2

Rekha, Sandeep Kale. "Use And Application Of ICT In Libraries." International Journal of Advance and Applied Research 10, no. 1 (2022): 247 to 250. https://doi.org/10.5281/zenodo.7184959.

Full text
Abstract:
<em>ICT has key Impact and effect in the environment of library and Information Centers. The libraries are now well equipped with ICT Infrastructure and Staff also using ICT for caring out different library activities .Due to ICT it is possible for libraries to provide right information to right user at right time form the globally distributed resources. Information communication Technology (ICT) and Web Technologies have changed the traditional concept of libraries. Today the Digital world is Concerned with creation, sharing and using information in digital form.21<sup>st</sup> century the book are not our means of preservation but also for dissemination of the information contained in them Now days most of function carried out by the libraries have been modernized with new technology .This paper highlights use and Application of ICT and Web Technologies in libraries.</em>
APA, Harvard, Vancouver, ISO, and other styles
3

Pooja, Rani, and Vivek Kumar Gupta Dr. "Information security legislation and regulations in India." International Journal of Trends in Emerging Research and Development 2, no. 4 (2024): 161–65. https://doi.org/10.5281/zenodo.14947963.

Full text
Abstract:
In addition to meeting their material and spiritual requirements, human people were empowered to fully cultivate and make use of their inherent humanity, intelligence, capacity, and moral compass, all because of the guarantee of human rights. Recognizing the intrinsic dignity and basic rights of every individual, they laid the groundwork for all fundamental freedoms, justice, and peace in the world. In 1994, Baseu Everyone, no matter their situation, has an inherent right to be safe from the state or other forms of public power; these rights are known as human rights. They sprang from people's desires for a world that recognises and values each person's intrinsic dignity. All other individual rights were based on the most prized and basic human rights-a person's right to exist and an individual's right to freedom. As a fundamental human right, the right to exist has assumed a prominent and important role. The right to life and personal liberty, as guaranteed in the most well-known provision of the Indian Constitution-provision 21-could be enforced against the state and extended to all citizens and foreigners. Recent years have seen an expansion of the right to life and individual liberty, as reported by the revised reading of Article 21 in the Maneka Gandhi case. The current emphasis on this issue has covered a lot of ground, including things that the framers of the Constitution may or may not have intended.
APA, Harvard, Vancouver, ISO, and other styles
4

Kemper, Donald W., and Molly Mettler. "The Meaningful Use of Information Therapy (Ix®)." International Journal of User-Driven Healthcare 3, no. 2 (2013): 1–8. http://dx.doi.org/10.4018/ijudh.2013040101.

Full text
Abstract:
Information Therapy (Ix), getting the right information to the right person at the right time in order to help the person make an informed health decision, is a field that is constantly evolving. Over the past decade, several changes –particularly technological and policy-based developments -- have helped to advance the model. This paper traces the evolution of Information Therapy from a good idea to one that has been widely adopted by clinicians. This paper emphasizes the use of the electronic medical record (EMR) in delivering information therapy prescriptions directly to patients. Patient Response (Px) is proposed as the next phase in the evolution of Information Therapy and patient-centered care.
APA, Harvard, Vancouver, ISO, and other styles
5

Barabash, Olha, and Diana Yatskiv. "Information rights as a component of the fourth generation of human rights." Law Review of Kyiv University of Law, no. 1 (May 5, 2021): 27–31. http://dx.doi.org/10.36695/2219-5521.1.2021.03.

Full text
Abstract:
The article examines information rights as a component of the fourth generation of human rights. It is emphasized that the fourthgeneration of rights is forming in the modern post-industrial society, in which the active development of information technology is ta -king place. The fourth generation of subjective human rights consists of the right to information and information systems. It is emphasizedthat nowadays information technology has a significant impact on the status of individuals, the realization of their rights and requirea review of legal regulation at both international and national levels. It is noted that the right to information, which is enshrined in theConstitution of Ukraine, consists of particular provisions representing independent subjective rights. In general, they can be divi ded intotwo groups: ‘rights to the right’ (freedom of thought and freedom of speech, freedom of the media, right to freely collect, store, use anddisseminate information in any lawful manner, right of everyone to reliable information about the environment) and rights to exercise therights of the first group (here the emphasis is mainly placed on forms of information dissemination, on storage and use of documentedinformation, on information technology and information protection, on protection of human and civil rights and freedoms in the proces -sing of personal data, including protection of rights to privacy, personal and family secret). It is concluded that change in the developmentof the information society clearly indicates that information technology (in particular, the right to information as a fourth generation right)is changing all generations of human rights. Therefore, the increase in the amount of information belonging to a person puts forward newrequirements for legal methods of protecting the human right to information. Timely response to alterations in the information sphere,including in the field of electronic interaction between citizens and the state, will allow developing new ways to ensure the human rightto information, the realization of which can accelerate the legal development of Ukraine in a post-industrial information society and therule-of-law state, protecting the information sphere of everyone no less than other, more traditional rights and freedoms.
APA, Harvard, Vancouver, ISO, and other styles
6

Wilson, Matthew J., Tonya L. Ramey, Michael R. Donaldson, Ryan R. Germain, and Elizabeth K. Perkin. "Communicating science: Sending the right message to the right audience." FACETS 1, no. 1 (2017): 127–37. http://dx.doi.org/10.1139/facets-2016-0015.

Full text
Abstract:
For science communication to be effective, scientists must understand which sources of information their target audiences most frequently use and trust. We surveyed academic and non-academic scientists, natural resource managers, policymakers, students, and the general public about how they access, trust, and communicate scientific information. We found trust and use of information sources was related to participant age and group identity, but all groups had high levels of use and trust of personal experience and colleagues. Academic journals were the most trusted source by all groups, and social media the least trusted by most groups. The level of communication between target groups was not always bilateral, with the public generally perceiving their interaction with all other groups as low. These results provide remarkable insight into the flow of scientific information. We present these findings in the context of facilitating information flow between scientists and other stakeholders of scientific information.
APA, Harvard, Vancouver, ISO, and other styles
7

Farmer, Lesley S. J. "Information as a Human Right." International Journal of Adult Vocational Education and Technology 6, no. 1 (2015): 18–35. http://dx.doi.org/10.4018/ijavet.2015010102.

Full text
Abstract:
Information lies at the core of freedom of expression since it empowers citizens to understand the functions of media and other information providers, to access and critically evaluate their content, and to make informed decisions as users and producer of information and media content. Information and related technologies have become increasingly essential to education, employment, social interaction, and civic participation. Resultantly, greater focus has been placed on the idea that information is a necessary human right. While physical access to technology is now imperative to survive and contribute in today's Information Society, intellectual access is also required, particularly with the Internet's interactive socially collaborative mode. In addition, organizations need to provide the infrastructure and other preconditions to insure equitable access and use of information.
APA, Harvard, Vancouver, ISO, and other styles
8

Jokubauskas, Remigijus. "Creditor’s Right to Information in Corporate Bankruptcy Proceedings." Teisė 113 (December 20, 2019): 108–22. http://dx.doi.org/10.15388/teise.2019.113.6.

Full text
Abstract:
This article examines the practical problems deriving from the exercise of the creditor’s right to information regarding the course of corporate bankruptcy proceedings. The legal regulation of foreign states shows that creditors shall participate in bankruptcy proceedings actively. Namely, timely information about the corporate bankruptcy proceedings allows creditors to exercise other rights and impact the decision-making in this process. Disputes often arise regarding how creditors can use this right to information and what legitimate restrictions can be established for its implementation.
APA, Harvard, Vancouver, ISO, and other styles
9

Ivanova, Tatyana V. "THE USE OF A PATENT BY CO-AUTH ORS AND HEIRS FOR COMMERCIAL PURPOSES AND SOME ISSUES OF PUBLICITY IN PROCEEDINGS RELATED TO DISPUTES OVER INTELLECTUAL RIGHT PROTECTION." Law of succession 3 (October 8, 2020): 24–27. http://dx.doi.org/10.18572/2072-4179-2020-3-24-27.

Full text
Abstract:
The article considers certain situations that arise while using a patent for an invention by co-authors and successors and some issues of publicity in legal disputes over the protection of intellectual property rights. The invention created by a team of authors serves as the basis for the association of co-authors in an organization aimed at the commercial use of a patent. The exclusive right to a patent shall transfer to the successors, but the right to membership in the organization where the patent was supposed to be used may not be transferred, in which case the successors shall have limited access to information on the use of the patent. Various secrets, confidentiality of information, unavailability of information, complexity of protecting intellectual property rights, complex relationship between members of the organization and successors represent only some of the problems that create obstacles to the normal exercise of the right to use a patent for an invention and to get profit from its use. There is no special method to protect intellectual property right, such as the request to provide access to the information on shared use of a patent. The publicity principle, being one of the principles of legal proceedings, provides the condition for defining the truth in the process of proving, the court provides the conditions for the timely receipt by the participants of the required and sufficient procedural information on a particular case. The publicity of information in a legal case is most likely to provide the opportunity to satisfy a claim for the protection of intellectual property right. The right to membership in the organization, in which the patent was supposed to be used when it had been developed by the co-authors of the organization, can be considered as a guarantee for the right to use the patent. The exclusion of at least one element from this system shall create unequal rights and shall make it impossible to achieve a result — receive profit from the use of a patent.
APA, Harvard, Vancouver, ISO, and other styles
10

Natalіа, Selivanova, and Delik Natalia. "The right to use the land as an object of accounting." ECONOMICS: time realities 3, no. 36 (2018): 43–48. https://doi.org/10.5281/zenodo.1308148.

Full text
Abstract:
The article analyzes the data on the state and development of land relations in Ukraine. The information regarding the right to use the land plots and the use of the Lines is provided. The bookkeeping postings concerning the registration of land plots at enterprises with Temporary and long-term usage rights are shown. It is proved that the right to use is an intangible asset of enterprises. The peculiarities of the lease agreement of the land and those who can use the land on the rights of permanent use are highlighted. It is revealed that the main users of land lease are agricultural enterprises. The comparative characteristic of the permanent and Temporary Right of Use is made. The land relations in the land lease are considered and the amount of the rent is leased to the landlord.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Right to use information"

1

Leonard, Carol. "The use of contextual information by right brain-damaged individuals in the resolution of ambiguous pronouns." Thesis, McGill University, 1994. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=41662.

Full text
Abstract:
Three experiments were conducted with the primary purpose of investigating the ability of right brain-damaged (RBD) individuals to use contextual information--at the level of the single sentence, in terms of the integration of information between clauses, and at the level of a minimal discourse (i.e. two sentences)--in the resolution of ambiguous pronouns. The investigation was extended to a group of left brain-damaged (LBD) and non brain-damaged (NBD) individuals. Four additional studies investigated and found no age effects in the use of contextual information in pronoun resolution. The results of the experiments with brain-damaged subjects were contrary to initial expectations. All three experiments were consistent in demonstrating that the RBD group was influenced by contextual information in a manner similar to that demonstrated by both the LBD and NBD groups. The results are discussed in terms of the distinction between automatic and effortful processing.
APA, Harvard, Vancouver, ISO, and other styles
2

Bakke, Sharen A. "Privacy, Control, and the Use of Information Technology: The Development, Validation, and Testing of the Privacy-Invasive Perceptions Scale." [Kent, Ohio] : Kent State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=kent1145192698.

Full text
Abstract:
Thesis (Ph.D.)--Kent State University, 2006.<br>Title from PDF t.p. (viewed Sept. 20, 2006). Advisor: Alan Brandyberry and Marvin Troutt. Keywords: privacy; control; information technology use; scale development. Includes bibliographical references (p. 103-120).
APA, Harvard, Vancouver, ISO, and other styles
3

Heite, Martin. "Privacy, Constitutions and the Law of Torts: a Comparative and Theoretical Analysis of Protecting Personal Information Against Dissemination in New Zealand, the UK and the USA." University of Canterbury. Law, 2008. http://hdl.handle.net/10092/2955.

Full text
Abstract:
The New Zealand Court of Appeal has recently acknowledged the existence of a freestanding tort of invasion of privacy in Hosking v Runting. The tort is in its infancy and the courts are still grappling with essential problems, the most prominent of which is the conflict with countervailing interests in freedom of speech. In need of guidance, the courts turn to overseas authorities, predominantly from the United Kingdom and the United States of America. The commonly found descriptive nature of the comparison invites a broader analysis of these jurisdictions. In this thesis, I offer a theoretically informed comparative law analysis of New Zealand's new tort with the American public disclosure of private facts tort and the British extended breach of confidence action. In all three jurisdictions, the conflict of privacy with individual and societal concerns in freedom of speech has led to an exten-sion of (quasi-) constitutional norms derived, for instance, from the New Zealand Bill of Rights Act 1990 into the common law sphere – the horizontal effect. The horizontal application of constitutional rights poses significant legal problems to the common law, because it has learned to deal with duties rather than rights. The time has come to re-consider the nature of rights in both constitutional and tort law. The comparison shows that New Zealand has effectively adopted two torts – one following the duty-based lead of the United States of America and an alternative modelled along the lines of the more rights-orientated British law. The law of the United Kingdom and the USA differ to a degree that calls their comparability into question. I present the preferable British ap-proach as a 'constitutionalised common law tort of privacy.' The results also show that this model represents a competitive third way to traditional solutions based on common law or statute by means of utilising a statutory human rights instrument as an analytical framework for the common law.
APA, Harvard, Vancouver, ISO, and other styles
4

Kubiszewski, Ida. "Searching for the Sweet Spot: Managing Information as a Good that Improves with Use." ScholarWorks @ UVM, 2010. http://scholarworks.uvm.edu/graddis/129.

Full text
Abstract:
‘Additive’ goods and services are defined as those that improve with use. They are not naturally rival, or even non-rival, but are “anti-rival.” Information is an example. Information can be made excludable through the use of patents and copyrights, however this does not necessarily lead to socially optimal production and allocation. A more flexible, open access, and decentralized process for the production and allocation of information could improve social welfare. This dissertation describes the challenges and problems with privatizing and restricting access to information and reviews alternative mechanisms for its allocation. Two particular issues at opposite ends of the access spectrum are: (1) strict barriers to private industry databases and (2) quality perception and control of open access information. The first chapter discusses our current system of producing and distributing information and potential ways to stimulate the transition to a new regime. This paper concludes that some of the ideas to seed such a transition include: (1) redefining wellbeing metrics; (2) ensuring the wellbeing of populations during the transition; (3) reducing complexity and increase resilience within institutions; (4) expanding the “commons sector”; and (4) using the internet to remove communication barriers and improve democracy. The second chapter discusses our current system of determining which information to produce, which resources to allocate towards the production of information, and how to distribute that information once produced. The paper concludes that alternative incentive methods, both inside and outside of the market, of producing information and new methods for distributing it to those that can make best use of it, would improve social welfare. These include: (1) prizes; (2) non-monetary incentives; (3) capping salaries; (4) research consortium; and (5) publicly funded research. Chapter 3 explores the difficulty in determining basic energy information under the current proprietary information system using an analysis of the energy return on investment (EROI) of wind energy. It utilizes a meta-analysis of the energy return on investment (EROI) to obtain basic information about the energy inputs and outputs necessary for the manufacturing, installing, operating, and decommissioning of wind turbines. This analysis shows an average EROI for all studies (operational and conceptual) of 25.2 (n=114; std. dev.=22.3). It concludes that making information proprietary severely limits the accuracy of EROI estimates and increases the difficulty of making the best social choices. Chapter 4 explores the perceived credibility of web-based information using an experiment with Encyclopedia Britannica, Wikipedia, and the Encyclopedia of Earth. Compared to Encyclopedia Britannica, both Encyclopedia of Earth and Wikipedia were found to provide a statistically negative perception of credibility. The other factors analyzed (presence or absence of an author, references, a biased sponsor, or an award) contribute to “brand equity” a composite characteristic that takes significant time to develop. The relatively new Encyclopedia of Earth has not yet developed enough brand recognition to affect credibility one-way or the other, but its positive characteristics should help build the brand and credibility over time.
APA, Harvard, Vancouver, ISO, and other styles
5

Syrengelas, Emmanouil. "Seeking for obstacles to achieve feasible interventions within NGOs with the use of Participatory Design : A study in “Network for children’s rights” Greek NGO." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-73264.

Full text
Abstract:
Non Governmental Organizations have a mission to improve the conditions of the whole or a part of the local societies in the place where they are active. “Network for children’s rights” is a Greek NGO that mostly aims to fight for and ensure the appliance of children’s rights as these have been embodied in national and European Union legislation and international treaties. Its employees are working hard to fulfill their everyday tasks and serve the children members. The scope of this study is to seek for major obstacles in order to achieve feasible interventions within NGOs with the use of Participatory Design. PD methodology is considered a fruitful one to engage the employees and other stakeholders who are affected by a problematic situation into the following processes: 1) to co-research the situation inside the working, social, financial and legal context, 2) to express their feelings, opinions, ideas on how the situation can be improved according to their needs, 3) to co-design and evaluate the solution. To fulfill the scope, a PD study in the NCR was conducted. The outcome of the study as well as its whole process were evaluated. Two major obstacles were found. The first and most significant one has been the very small percentage of representation of the stakeholders of the NGO who participated in the study. The second one has been the lack of collaborative language games to ensure mutual understanding among participants. A researcher should pay extra attention to overcome these obstacles and future studies may provide with new tools that confront them.
APA, Harvard, Vancouver, ISO, and other styles
6

Höber, Christoffer, and Josef Marklund. "GDPR:s effekter på användares skydd avpersonliga data på internet." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-43685.

Full text
Abstract:
Personliga data samlas in när vi besöker internetsidor och tillgång till personliga data har snabbt fåttavgörande betydelse för alltfler företags värdeskapande. Därför har metodutveckling för tillgång tillpersonliga data blivit en central del i företags konkurrenskraft. Det medför emellertid stora och riskerför individers personliga integritet. För att motverka sådana risker infördes 2018 den europeiskadataskyddsförordningen (GDPR). Vår analys visar att GDPR ger ett stort tolkningsutrymme för hurföretag informerar om datainsamling via cookie-notifikationer. Utformningen varierar därför kraftigtoch designas ofta för att styra användare mot att acceptera datainsamling. Vår analys visar att eneffekt av GDPR är att antalet cookie-notifikationer ökat avsevärt och att individers medvetenhet omoch oro inför hur personliga data samlas in och används har ökat efter GDPR:s införande. Däremotpekar våra resultat på att GDPR inte haft några betydande effekter på användares beteende när detgäller att aktivt skydda sina personliga data. De viktigaste skälen till att GDPR inte haft några effekterpå användarnas beteende för att skydda sina personliga data är att det är alltför tidskrävande och svårt.Vår analys visar därför att det så kallade “informerade samtycket” till insamling av personliga datainte effektivt uppnås trots GDPR:s införande. Vår slutsats för fortsatt forskning är att det är angelägetmed fördjupad forskning kring obalanser mellan individer, företag och reglerande myndigheterkopplat till hur personliga data samlas in, sammanställs och används.<br>The collection of personal data has become a crucial part of companies value creation. Because ofthat, the development of methods to get access to power over the personal data has become a centralpart in the competitiveness between companies. This has resulted in risks and concerns concerningindividual privacy. To counteract these risks, the European Union introduced the General dataProtection Regulation (GDPR). Our analysis shows that one effect of the GDPR is an increased usageof cookie-notifications when informing users of data collection. Our analysis also shows that theregulation has room for interpretation for how the companies inform the user about data collectionpractices. That has resulted in varied design methods in cookie-notifications that often steer userstowards an acceptance of collection of personal data. Because of the increased usage of cookienotificationsusers awareness and privacy concerns has drastically increased. However, our findingsshow that the regulation hasn’t had an effect on user behavior, specifically connected to protectingtheir personal data online. The main reasons for this are that it takes a lot of effort and time tocomprehend how that is done practically. Therefore, our analysis shows that “informed consent” isnot effectively achieved in the current methods, despite it being required in the regulation. Ourconclusion is therefore that future research should focus on the imbalance between individuals,companies and regulatory instances when addressing the problems with collection and usage of personal data.
APA, Harvard, Vancouver, ISO, and other styles
7

Scrollini, Mendez Fabrizio. "Right to information arenas : exploring the right to information in Chile, New Zealand and Uruguay." Thesis, London School of Economics and Political Science (University of London), 2015. http://etheses.lse.ac.uk/3361/.

Full text
Abstract:
The Right to Information (RTI) – a right every individual has to access public information held by governments – is now established in more than 100 countries. RTI laws set up a new logic in government: availability of public information is the principle and secrecy the exception. RTI laws create new public information arenas where several actors request, release and use public information for several purposes. In this work, I seek to explore why RTI arenas based on similar principles, work differently leading to different outputs. My explanation is based on a historical- institutionalist perspective arguing that origins of these laws and previous institutional structures matter. I argue that three factors help to shape these arenas: the level of participation in the policy-making process, the professionalisation of state bureaucracy and RTI enforcement institutions. The combination of these factors gives us three different kinds of arenas: functional, mixed and contested. I develop a conceptual framework, operating at a middle-range theory level, to analyse the role RTI laws, requesters, the state, and the existence of RTI enforcement institutions play in each configuration. I show how these arenas evolve and work, running a structured and focused comparison of three case studies: Uruguay, Chile and New Zealand. This work shows how these arenas ended up differing in outputs such as availability of public information and efficiency in processing RTI requests, as well as the existence of effective accountability mechanisms to resolve disputes about public information.
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Rongbin. "Managing Autonomy by Hierarchically Managing Information: Autonomy and Information at the Right Time and the Right Place." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4014.

Full text
Abstract:
When working with a complex AI or robotics system in a specific application, users often need to incorporate their special domain knowledge into the autonomous system. Such needs call for the ability to manage autonomy. However, managing autonomy can be a difficult task because the internal mechanisms and algorithms of the autonomous components may be beyond the users' understanding. We propose an approach where users manage autonomy indirectly by managing information provided to the intelligent system hierarchically at three different temporal scales: strategic, between-episodes, and within-episode. Information management tools at multiple temporal scales allow users to influence the autonomous behaviors of the system without the need for tedious direct/manual control. Information fed to the system can be in the forms of areas of focus, representations of task difficulty, and the amount of autonomy desired. We apply this approach to using an Unmanned Aerial Vehicle (UAV) to support Wilderness Search and Rescue (WiSAR). This dissertation presents autonomous algorithms/components and autonomy management tools/interfaces we designed at different temporal scales, and provides evidence that the approach improves the performance of the human-robot team and the experience of the human partner.
APA, Harvard, Vancouver, ISO, and other styles
9

Skupien, Kathryn Stephanie. "Colors and Mapping: The Right to Receive Information." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4845.

Full text
Abstract:
Color is used in everything we see and do and it often can be used for effect and representation, particularly on maps and transportation signage. This study explores the issues that the color blind population exhibits when viewing these maps and signs. Seeing that 8%#37; of the male population is afflicted with some form of color blindness, it is pertinent that research reflect these issues and take into consideration the Right to Receive Information for this population. A qualitative method using Photovoice and interviews was used to determine whether this population considers itself having a disability and what solutions can be found to assist with issues of seeing colors on transportation maps and signage. Results show that although half of the participants feel they have a disability, they do not want to be categorized with other disabilities or have restrictions placed on them. The overall consensus regarding maps was to use less colors and simplify. One solution to the issue of being able to read maps and signage was to instill the ColorADD Symbol System in the U.S. comprehensively. This study provides insight to the issues faced by the color blind population regarding Right to Receive Information for maps and signage, including alternate solutions to providing color blind people with sufficient materials. The significance of this research can be used to provide safer transportation signage for driving and better maps for traveling.
APA, Harvard, Vancouver, ISO, and other styles
10

Миколаївна, Проскура Ганна, and K. I. Zhebrovska. "ACCESS TO ECOLOGICAL INFORMATION AS A HUMAN RIGHT." Thesis, Сучасна університетська правова освіта і наука: Матер. VIIІ Міжн. наук.-практ. конф. (м. Київ, НАУ, 23 лютого 2018 р.). Том 1. Тернопіль: Вектор, 2018. C. 213-215, 2018. http://er.nau.edu.ua/handle/NAU/32720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Right to use information"

1

Richard, Fischer L., and American Bankers Association, eds. Privacy in electronic commerce: A compendium of essays on the use of information. American Bankers Association, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jasper, Kim. User access & information protection: Managing open access & information protection. PROJECT CONSULT, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rodrigues, Charmaine. Karnataka Right to Information Act, 2000: A user guide. Edited by Muralidharan Y. G, Daruwala Maja, Nayak Venkatesh, Commonwealth Human Rights Initiative, Consumer Rights Education & Awareness Trust (Bangalore, India), and Karnataka (India). Commonwealth Human Rights Initiative, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. "How do businesses use customer information: Is the customer's privacy protected?" : hearing before ... 107th Congress, 1st session, July 26, 2001. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Halpin, Edward F., and John M. Lannon. Human rights and information communication technologies: Trends and consequences of use. Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Breakey, Hugh. Intellectual liberty: Natural rights and intellectual property. Ashgate, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Bureau of Justice Statistics., ed. Public attitudes toward uses of criminal history information: A privacy, technology, and criminal justice information report. U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Statistics, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Canada. Privacy Act: An office consolidation and index = Loi sur la protection des renseignements personnels : une codification administrative et index. Privacy Commissioner of Canada, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Canada. Privacy Act: An office consolidation and index = Loi sur la protection des renseignements personnels : une codification administrative et index. Privacy Commissioner of Canada, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Canada. The Privacy Act: An office consolidation and index = La loi sur la protection des renseignements personnels : une codification administrative et index. Privacy Commissioner of Canada, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Right to use information"

1

Teo, Gloria. "Getting the Right Information to the Right Person." In User Modeling 2001. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44566-8_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Volovelsky, Uri. "Civilian Use of Drones as a Test Case for the Right to Privacy: An Israeli Perspective." In Information Technology and Law Series. T.M.C. Asser Press, 2016. http://dx.doi.org/10.1007/978-94-6265-132-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Leksono, Bambang Edhi, Andi Ristiawan, Hendriatiningsih Sadikin, and Lucy Meyke. "The Underground Space Use Right Registration with the Approach of 3 Dimensional Cadastre Concept." In Cadastre: Geo-Information Innovations in Land Administration. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-51216-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Paulino, Fernando Oliveira, and Luma Poletti Dutra. "Epistemic Rights and Right to Information in Brazil and Mexico." In Epistemic Rights in the Era of Digital Disruption. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-45976-4_9.

Full text
Abstract:
AbstractUsing the experiences of two Latin American countries, Brazil and Mexico, this article analyses one aspect of the broad concept of epistemic rights: the right to information. This article aims to understand the strategies used to defend the approval of access to information laws in both countries and the ongoing challenges to guaranteeing this right in both countries after the implementation stage. The findings show that there was an effort in Mexico to detach the theme from the journalistic sphere to show its importance to different audiences. Meanwhile, in Brazil, there was a link to the rights to memory and truth. In both countries, the difficulties that arise concern the protection of the norm and its enforcement bodies in the face of different political scenarios.
APA, Harvard, Vancouver, ISO, and other styles
5

Gawu, Delali A., and Richard Obeng Mensah. "Balancing the Freedom of Expression, Right to Information and Use of Social Media in Ghana." In Democratic Governance, Law, and Development in Africa. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15397-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Krasovec, Barbara, and Teo Prica. "Secure Usage of Containers in the HPC Environment." In Communications in Computer and Information Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-86240-3_7.

Full text
Abstract:
Abstract Containers in High Performance Computing (HPC) provide a flexible and efficient alternative to traditional modular software. They allow researchers and engineers to package applications and their dependencies in a single file, ensuring portability, reproducibility and consistent performance across different computing environments. With the emergence of AI, industrial users and SMEs in HPC, containers have become even more convenient to use, as they can also meet the security requirements for isolating user workloads. As the HPC community embraces container technology, it is ushering in a new era of more efficient, repeatable and scalable research computing. However, adoption of containers in HPC has been relatively slow, largely due to misconceptions about how they work and concerns about potential performance degradation, energy inefficiency and security risks. This article looks at the security considerations when using containers and uses practical examples to show that, with the right configuration and tools, containers can be as secure as any other system application.
APA, Harvard, Vancouver, ISO, and other styles
7

Marcos, Diego, Jana Kierdorf, Ted Cheeseman, Devis Tuia, and Ribana Roscher. "A Whale’s Tail - Finding the Right Whale in an Uncertain World." In xxAI - Beyond Explainable AI. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04083-2_15.

Full text
Abstract:
AbstractExplainable machine learning and uncertainty quantification have emerged as promising approaches to check the suitability and understand the decision process of a data-driven model, to learn new insights from data, but also to get more information about the quality of a specific observation. In particular, heatmapping techniques that indicate the sensitivity of image regions are routinely used in image analysis and interpretation. In this paper, we consider a landmark-based approach to generate heatmaps that help derive sensitivity and uncertainty information for an application in marine science to support the monitoring of whales. Single whale identification is important to monitor the migration of whales, to avoid double counting of individuals and to reach more accurate population estimates. Here, we specifically explore the use of fluke landmarks learned as attention maps for local feature extraction and without other supervision than the whale IDs. These individual fluke landmarks are then used jointly to predict the whale ID. With this model, we use several techniques to estimate the sensitivity and uncertainty as a function of the consensus level and stability of localisation among the landmarks. For our experiments, we use images of humpback whale flukes provided by the Kaggle Challenge “Humpback Whale Identification” and compare our results to those of a whale expert.
APA, Harvard, Vancouver, ISO, and other styles
8

Naib, Sudhir. "How to Make use of Right to Information." In The Right to Information Act 2005. Oxford University Press, 2011. http://dx.doi.org/10.1093/acprof:oso/9780198067474.003.0003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vrabec, Helena U. "The Right to Information." In Data Subject Rights under the GDPR. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198868422.003.0004.

Full text
Abstract:
Chapter 4 addresses the right to information, the cornerstone of the system of control rights under the GDPR and the ePrivacy Directive. The types of information that are likely to provide data subjects the most relevant information about data processing in the context of the data-driven economy are analysed more thoroughly, e.g., the information about the legal basis for data processing, the information about the sources of data, and the details on automated decision-making. The chapter investigates the right to explanation and icons which seem to offer a new, promising option to exercise more control over modern data flows. In the ePrivacy area, the right to information plays an increasingly important role in regulating the use of cookies and similar tracking technologies. The chapter acknowledges that, despite some novel steps in the GDPR, entitlements that the law affords are undermined due to three groups of factors: psychological, technological, and economic.
APA, Harvard, Vancouver, ISO, and other styles
10

"The Right Use of Leisure." In The Continued Exercise of Reason, edited by Brendan Dooley. The MIT Press, 2018. http://dx.doi.org/10.7551/mitpress/9780262535007.003.0006.

Full text
Abstract:
This chapter presents George Boole's lecture on the right use of leisure. He says that every right involves a responsibility. The greater our freedom from external restrictions, the more we become the rightful subjects of the moral law within us. The less our accountability to man, the greater our accountability to a higher power. Such a thing as irresponsible right has no existence in this world. Even in the formation of opinion, which is of all things the most free from human control, and for which something like irresponsible right has been claimed, we are deeply answerable for the use we make of our reason, our means of information, and our various opportunities of arriving at a correct judgment.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Right to use information"

1

Korzun, Joel. "A Corrosion Control Information Management Program." In CORROSION 2012. NACE International, 2012. https://doi.org/10.5006/c2012-01193.

Full text
Abstract:
Abstract A corrosion control information management program is of critical importance to any life cycle maintenance organization. In times of tight budgets, the life cycle management of long time to fail components requires a comprehensive strategy for condition assessments, data management, and standardized tasking for restoration during maintenance availability periods. Improvements in technology involving information sharing and failure mode analysis have made costs and schedule savings possible by facilitating maintenance decisions to conduct the right assessment and restoration tasks, at the right time, with managed cost and schedule risk. This paper uses examples from the US Navy corrosion control program to demonstrate to infrastructure owners the importance of having a rigorous inspection and data management program.
APA, Harvard, Vancouver, ISO, and other styles
2

Смагина, Елена, and Elena Smagina. "New procedural rights and responsibilities of participants in the civil process related to the use of information technology." In St. Petersburg international Legal forum RD forum video — Rostov-na-Donu. INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/conferencearticle_5a3a6fab84e6c4.16118580.

Full text
Abstract:
The article is devoted to new procedural rights and responsibilities of participants in the civil process: the right to be notified by the latest means of communication; the right to file documents in court in electronic form; the right to get acquainted with the case materials and judicial acts in electronic form; the right to participate in the process by videoconferencing
APA, Harvard, Vancouver, ISO, and other styles
3

Yong-heng, Lu. "Exotic option-based rural land-use right pricing model." In 2010 2nd IEEE International Conference on Information Management and Engineering. IEEE, 2010. http://dx.doi.org/10.1109/icime.2010.5477943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Haiqin. "Game Analysis of Rural Land-Use Right Transfers with Government Regulations." In 2010 2nd International Conference on E-business and Information System Security (EBISS). IEEE, 2010. http://dx.doi.org/10.1109/ebiss.2010.5473453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

LADYCHENKO, Viktor. "INFORMATION POLICY IN THE ENVIRONMENTAL SPHERE IN THE CONTEXT OF SUSTAINABLE DEVELOPMENT OF UKRAINE AND THE EU." In RURAL DEVELOPMENT. Aleksandras Stulginskis University, 2018. http://dx.doi.org/10.15544/rd.2017.218.

Full text
Abstract:
The purpose of this research is to develop a legal mechanism for ensuring the right to access environmental information to ensure sustainable development of society. In the context of our study we developed an understanding of information human rights - the right to collect, disseminate, use and preserve environmental information is fundamental and natural. We understand information human rights as a group of rights with a center around freedom of information, the right to environmental information, the right to communication in environmental sphere, the right to access to environmental information that is public or socially significant, the right to privacy, and the protection of personal data. In the EU, access to environmental information is regulated by Directive 2003/4/EC (Aarhus Convention, 1998). Citizens of the EU have the right to receive this information within one month from the moment they ask and not to mention why they need it. In addition, public authorities are required to actively disseminate information on environmental information at their disposal. In Ukraine defined system of a jurisdiction whose collection includes different types of environmental information and formation of information on environmental policy. But the issue of public administration in the field of environmental protection is currently split between different executive bodies; there is no united information policy and the body responsible for it. There is no obligation for the authorities to inform the population even in crisis situations. This study will form the legal framework to ensure the right of access to environmental information in Ukraine by introducing the position of Information Commissioner - an official, the competence of which includes monitoring of compliance of information law with information policy in the environmental field.
APA, Harvard, Vancouver, ISO, and other styles
6

"HEURISTICS SUPPORTING USABLE AUTHORING TOOLS - Matching the right tool to the right user." In 6th International Conference on Enterprise Information Systems. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0002612901690178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yoon, Sang-Pil, Moon-Ho Joo, and Hun-Yeong Kwon. "Role of law as a guardian of the right to use public sector information." In dg.o '18: 19th Annual International Conference on Digital Government Research. ACM, 2018. http://dx.doi.org/10.1145/3209281.3209297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fawzi Omer, Saman, and Asos Namiq Brakhas. "Legal Protection of the Right to Obtain Information: In light of the Law on the Right to Access Information in the Kurdistan Region-Iraq No. (11) of 2013." In Digital Media Effects on Society Security Under Domestic and International Laws. Sulaimani Polytechnic University, 2024. http://dx.doi.org/10.24017/dmedialaw24.05.

Full text
Abstract:
A right is a person’s voluntary ability or authority that he derives from the law within a specific scope. This ability or authority requires knowledge of its scope, limits, and aspects of its use. This cannot be achieved except after the person is fully aware of all the necessary information about his right first and about all the aspects in which he can exercise his rights. Secondly, just as a person cannot take his steps in the dark without stumbling or getting lost, just as a person cannot take a step-in life without full knowledge of his legal rights and duties. This knowledge is only achieved when there is transparency around him, through the availability of all the necessary information to him. Therefore, the benefit of the right revolves around existence and non-existence with knowledge, and knowledge is not acquired without the right to view and explain all the information necessary for knowledge of a specific subject. It is like someone rotating in a closed circle, right and knowledge revolve together in a similar circle, and to break this circle, the meaning of the information and the legal basis for the right must be determined. Obtaining it, the scope of obtaining it, distinguishing information that is prohibited from being obtained from information that is permissible to obtain, and explaining the mechanism for obtaining information and the legal and administrative responsibility for violating the right to obtain information.
APA, Harvard, Vancouver, ISO, and other styles
9

Chokngamwong, Roongroj, and Nattapong Jirabutr. "Mobile Digital Right Management with enhanced security using limited-use session keys." In 2015 12th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON). IEEE, 2015. http://dx.doi.org/10.1109/ecticon.2015.7207069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Siapera, Eugenia, and Paloma Viejo Otero. "How Do Far-Right Movements and Parties Use the Internet and the Social Media? Digital Facebook Postcards, With Hate, Your Far Right. ." In ISIS Summit Vienna 2015—The Information Society at the Crossroads. MDPI, 2015. http://dx.doi.org/10.3390/isis-summit-vienna-2015-s3007.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Right to use information"

1

Asari, Vijayan, Paheding Sidike, Binu Nair, Saibabu Arigela, Varun Santhaseelan, and Chen Cui. PR-433-133700-R01 Pipeline Right-of-Way Automated Threat Detection by Advanced Image Analysis. Pipeline Research Council International, Inc. (PRCI), 2015. http://dx.doi.org/10.55274/r0010891.

Full text
Abstract:
A novel algorithmic framework for the robust detection and classification of machinery threats and other potentially harmful objects intruding onto a pipeline right-of-way (ROW) is designed from three perspectives: visibility improvement, context-based segmentation, and object recognition/classification. In the first part of the framework, an adaptive image enhancement algorithm is utilized to improve the visibility of aerial imagery to aid in threat detection. In this technique, a nonlinear transfer function is developed to enhance the processing of aerial imagery with extremely non-uniform lighting conditions. In the second part of the framework, the context-based segmentation is developed to eliminate regions from imagery that are not considered to be a threat to the pipeline. Context based segmentation makes use of a cascade of pre-trained classifiers to search for regions that are not threats. The context based segmentation algorithm accelerates threat identification and improves object detection rates. The last phase of the framework is an efficient object detection model. Efficient object detection �follows a three-stage approach which includes extraction of the local phase in the image and the use of local phase characteristics to locate machinery threats. The local phase is an image feature extraction technique which partially removes the lighting variance and preserves the edge information of the object. Multiple orientations of the same object are matched and the correct orientation is selected using feature matching by histogram of local phase in a multi-scale framework. The classifier outputs locations of threats to pipeline.�The advanced automatic image analysis system is intended to be capable of detecting construction equipment along the ROW of pipelines with a very high degree of accuracy in comparison with manual threat identification by a human analyst. �
APA, Harvard, Vancouver, ISO, and other styles
2

Fedorenko, Elena H., Vladyslav Ye Velychko, Svitlana O. Omelchenko, and Vladimir I. Zaselskiy. Learning free software using cloud services. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/3886.

Full text
Abstract:
The article deals with the use of cloud technology services in the study of free software. Free software is a social phenomenon based on the philosophy of freedom and the right to intellectual creative activity. To date, a significant number of software products have been created that are licensed under free software and not used in educational activities. The conducted research revealed the factors promoting and hindering the use of free software in educational activities. Conducted questionnaires, analysis of open data, research of scientists made it possible to conclude on the expediency of using free software in educational activities. Cloud technology is not only a modern trend of effective use of information and communication technologies in professional activity, but also a proven tool for educational activities. To get acquainted with the free software, the use of cloud technologies has been helpful, which is the goal of our research.
APA, Harvard, Vancouver, ISO, and other styles
3

Kukutai, Tahu, Shemana Cassim, Vanessa Clark, et al. Māori data sovereignty and privacy. Te Ngira Institute for Population Research, 2023. https://doi.org/10.15663/j21.35481.

Full text
Abstract:
Privacy is a fundamental human right. One of its most important aspects is information privacy – providing individuals with control over the way in which their personal data is collected, used, disclosed and otherwise handled. Existing information privacy regulation neither recognises nor protects the collective privacy rights of Indigenous peoples. This paper explores Indigenous data privacy, and the challenges and opportunities, in the context of Aotearoa. It has two aims: to identify gaps in existing data privacy approaches with regards to Indigenous data, and to provide a foundation for progressing alternative privacy paradigms. We argue that while personal data protection is necessary, it is insufficient to meet the needs of Māori and Aotearoa more broadly. In so doing, we draw on three areas of research: Indigenous and Māori data sovereignty; data and information privacy, including collective privacy; and Māori and Indigenous privacy perspectives. We examine key features of the Aotearoa privacy context – including the Privacy Act 2020 (NZ) – and consider the implications of te Tiriti o Waitangi and tikanga Māori for alternative privacy approaches. Future options, including legal and extra-legal measures, are proposed.
APA, Harvard, Vancouver, ISO, and other styles
4

Kjellander, Tove, and Lisa Sjöblom. Child and youth participation during crisis – Recommendations for decision makers in the Nordic region. Edited by Merethe Löberg and Christina Lindström. Nordic Welfare Centre, 2023. http://dx.doi.org/10.52746/okta3233.

Full text
Abstract:
Every young person is entitled to be heard and involved in matters that concern them. But how can decision makers safeguard meaningful child and youth participation in times of crisis? This publication contains 34 recommendations and 9 promising examples for decision makers in the Nordic region on how to build resilient structures for the future. The analysis and recommendations in this report are based on conversations with more than 100 representatives of youth and national experts in the Nordic region, covering the Nordic countries and Greenland, Åland and the Faroe Islands. The lessons and direct experiences of the representatives of Nordic youth organisations serve as an important source of information in preparing for potential crises in the future. The learnings are valuable for all adults making decisions that concerns young, and especially important for decision makers responsible for any crisis management structures. Decision makers in the Nordic region were not prepared to protect children’s rights when the Covid-19 pandemic hit. Their right to be heard was often neglected or recognised too late. To do better in a future crisis we need to have participatory structures in place before the crisis hits. Children and young people don’t have as much power as adults, and they cannot yet vote. We also need decision makers that have positive attitudes toward children and youth, necessary skills, and competence. Decision makers should presume that a child has the capacity to form her or his own views and recognize that she or he has the right to express them. We encourage local authorities and decision makers in the Nordic region to use the checklist in the publication to build resilient structures for child and youth participation. If a new crisis strikes, the Nordic region must ensure that the perspectives and experiences of children and youth are included in the decision making processes.
APA, Harvard, Vancouver, ISO, and other styles
5

Brophy, Kenny, and Alison Sheridan, eds. Neolithic Scotland: ScARF Panel Report. Society of Antiquaries of Scotland, 2012. http://dx.doi.org/10.9750/scarf.06.2012.196.

Full text
Abstract:
The main recommendations of the Panel report can be summarised as follows: The Overall Picture: more needs to be understood about the process of acculturation of indigenous communities; about the Atlantic, Breton strand of Neolithisation; about the ‘how and why’ of the spread of Grooved Ware use and its associated practices and traditions; and about reactions to Continental Beaker novelties which appeared from the 25th century. The Detailed Picture: Our understanding of developments in different parts of Scotland is very uneven, with Shetland and the north-west mainland being in particular need of targeted research. Also, here and elsewhere in Scotland, the chronology of developments needs to be clarified, especially as regards developments in the Hebrides. Lifeways and Lifestyles: Research needs to be directed towards filling the substantial gaps in our understanding of: i) subsistence strategies; ii) landscape use (including issues of population size and distribution); iii) environmental change and its consequences – and in particular issues of sea level rise, peat formation and woodland regeneration; and iv) the nature and organisation of the places where people lived; and to track changes over time in all of these. Material Culture and Use of Resources: In addition to fine-tuning our characterisation of material culture and resource use (and its changes over the course of the Neolithic), we need to apply a wider range of analytical approaches in order to discover more about manufacture and use.Some basic questions still need to be addressed (e.g. the chronology of felsite use in Shetland; what kind of pottery was in use, c 3000–2500, in areas where Grooved Ware was not used, etc.) and are outlined in the relevant section of the document. Our knowledge of organic artefacts is very limited, so research in waterlogged contexts is desirable. Identity, Society, Belief Systems: Basic questions about the organisation of society need to be addressed: are we dealing with communities that started out as egalitarian, but (in some regions) became socially differentiated? Can we identify acculturated indigenous people? How much mobility, and what kind of mobility, was there at different times during the Neolithic? And our chronology of certain monument types and key sites (including the Ring of Brodgar, despite its recent excavation) requires to be clarified, especially since we now know that certain types of monument (including Clava cairns) were not built during the Neolithic. The way in which certain types of site (e.g. large palisaded enclosures) were used remains to be clarified. Research and methodological issues: There is still much ignorance of the results of past and current research, so more effective means of dissemination are required. Basic inventory information (e.g. the Scottish Human Remains Database) needs to be compiled, and Canmore and museum database information needs to be updated and expanded – and, where not already available online, placed online, preferably with a Scottish Neolithic e-hub that directs the enquirer to all the available sources of information. The Historic Scotland on-line radiocarbon date inventory needs to be resurrected and kept up to date. Under-used resources, including the rich aerial photography archive in the NMRS, need to have their potential fully exploited. Multi-disciplinary, collaborative research (and the application of GIS modelling to spatial data in order to process the results) is vital if we are to escape from the current ‘silo’ approach and address key research questions from a range of perspectives; and awareness of relevant research outside Scotland is essential if we are to avoid reinventing the wheel. Our perspective needs to encompass multi-scale approaches, so that ScARF Neolithic Panel Report iv developments within Scotland can be understood at a local, regional and wider level. Most importantly, the right questions need to be framed, and the right research strategies need to be developed, in order to extract the maximum amount of information about the Scottish Neolithic.
APA, Harvard, Vancouver, ISO, and other styles
6

Hardy, Chris, Muthu Gandi, Adam Burry, and Desmond Power. PR-271-143716-R02 Bayesian Belief Network (BBN) Decision Support for Pipeline Third Party Interference. Pipeline Research Council International, Inc. (PRCI), 2018. http://dx.doi.org/10.55274/r0011530.

Full text
Abstract:
Satellite monitoring offers unique advantages to the industry in meeting the objectives of managing third-party encroachment to mitigate the potential of mechanical damage. Satellite monitoring of third-party encroachment involves a persistent acquisition of satellite imagery over a pipeline right-of-way (ROW), combined with computerized change detection to identify potentially hazardous activities. Monitoring using satellite synthetic aperture radar (SAR) provides an all-weather day or night monitoring of a specific geographic location. This monitoring service can be enhanced with third-party information to increase the confidence in targets detected within satellite imagery. This information can also be used to reduce false positives. A simplistic example of this would be to use road location information overlaid with target information. A target found on a road, such as a tractor-trailer rolling down a highway, represents a small risk to a pipeline and subsequently can be given a lower risk or even be removed as a threat altogether. On the other hand, a large vehicle in a field near a pipeline and not on a road may represent a higher risk to a pipeline. The higher confidence data in-turn allows pipeline integrity operations staff to focus on the higher probability targets, saving time and resources, while maintaining safety standards. This concept has been implemented in the form of a Bayesian Belief Network (BBN) Decision Support System (DSS) that integrates with CalPoly's Representational State Transfer Access for Pipeline Integrity Database (RAPID). RAPID houses multiple data sources such as roads, utilities, agriculture, and construction information to increase target confidence. Both the BBN-DSS and RAPID were developed under the same DOT Cooperative Agreement (OASRTRS-14-H-CAL).
APA, Harvard, Vancouver, ISO, and other styles
7

Arbib, James, and Tony Seba. Rethinking Humanity: Five Foundational Sector Disruptions, the Lifecycle of Civilizations, and the Coming Age of Freedom. RethinkX, 2020. http://dx.doi.org/10.61322/kzau1512.

Full text
Abstract:
During the 2020s, key technologies will converge to completely disrupt the five foundational sectors that underpin the global economy, and with them every major industry in the world today. In information, energy, food, transportation, and materials, costs will fall by a 10x or more, while production processes an order of magnitude more efficient will use 90% fewer natural resources with 10x-100x less waste. The knock-on effects for society will be as profound as the extraordinary possibilities that emerge. For the first time in history, we could overcome poverty easily. Access to all our basic needs could become a fundamental human right. But this is just one future outcome. The alternative could see our civilization collapse into a new dark age. Which path we take depends on the choices we make, starting today. The stakes could not be higher.
APA, Harvard, Vancouver, ISO, and other styles
8

Cairo, Jessica, Iulia Gherman, and Paul Cook. The effects of consumer freezing of food on its use-by date. Food Standards Agency, 2021. http://dx.doi.org/10.46756/sci.fsa.ret874.

Full text
Abstract:
The current Food Standards Agency consumer guidance states that consumers can freeze pre-packed food right up to the “use-by” date and, once food has been defrosted, it should be consumed within 24 hours. This strategic review has collated relevant data to determine whether there is an increased risk in relation to freezing ready-to-eat and non-ready-to-eat foods on the use-by date compared to the day before the use-by date. The review has focused on how the shelf-life of a food is determined and the effects of freezing, thawing and refrigeration on foodborne pathogens, including Bacillus spp., Campylobacter spp., Clostridium botulinum, Clostridium perfringens, Listeria monocytogenes, Salmonella, pathogenic Escherichia coli and Shigella spp. In the UK, food business operators are responsible for setting the safe shelf-life of a food which, in practice, should take into consideration the consumer habits, as well as the factors affecting shelf-life, such as food product characteristics, food processing techniques, transport, retail and domestic food storage temperatures, and type of packaging. Some countries, such as Ireland, New Zealand and Canada specifically recommend including safety margins within shelf lives. This is used to maintain brand integrity because it ensures that the food is consumed in its optimum condition. The FSA has collaborated with other organisations in the production of several guidance documents; however, there is no explicit requirement for the consideration of a margin of safety when setting shelf-life. There is also no legal requirement in the UK to consider a safety margin when setting shelf-life. According to regulations, pathogens should not be present in sufficient levels to cause foodborne illness on the use-by date, as food should still be safe to eat on that day. Given that these requirements are met, the risk assessed in this report arises from the processes of freezing, thawing and subsequent refrigerated storage for a further 24 hours, and the potential for these to increase pathogen levels. In this review, it was found that there is a risk of additional growth of certain pathogens during the refrigerated storage period although the impact of freezing and thawing on the extent of this growth was not readily evident. This risk would relate specifically to ready-to-eat foods as cooking of non-ready-to-eat foods after defrosting would eliminate pathogens. This report explores the potential issues related to consumer freezing on the use-by date and identifies additional information or research required to understand the risks involved. Overall, there is little evidence to suggest a significant change in risk between consumers freezing ready-to-eat food on the use-by date compared to freezing the food on the day before the use-by date. Specific areas that merit further research include the risks due to low temperature survival and growth of L. monocytogenes. There is also a lack of research on the effects of freezing, defrosting and refrigeration on the growth and toxin production of non-proteolytic C. botulinum, and the growth of Salmonella during domestic freezing and thawing. Finally, more information on how food business operators set shelf-life would enable a better understanding of the process and the extent of the safety margin when determining shelf-life of ready-to-eat and non-ready-to-eat foods.
APA, Harvard, Vancouver, ISO, and other styles
9

Jimenez, Emmanuel, Hugh Waddington, Neeta Goel, et al. Mixing and Matching: Using Qualitative Methods to Improve Quantitative Impact Evaluations (IEs) and Systematic Reviews (SRs) of Development Outcomes. Centre for Excellence and Development Impact and Learning (CEDIL), 2018. http://dx.doi.org/10.51744/cip5.

Full text
Abstract:
Recent books about evaluations to study the quantitative impact of development programs and projects typically devote a chapter or two of the need to complement the analysis with other methods – specifically qualitative techniques. They often cite how qualitative techniques help explain the reason for positive or negative quantitative results. This is key if the one is to draw conclusions for accountability or for learning to improve future program design. Or they explain how qualitative work is critical to make sure that quantitative data are collected in the right way. Despite these textbook recommendations, there has been a wide range of experiences in how using both quantitative and qualitative methods have affected the overall quality of evaluations. In many cases, the qualitative analysis consists mostly of quotes to justify findings from the quantitative work. While this helps provide context, there is not much value-added beyond making the an otherwise ‘dry’ quantitative presentation more interesting. Some recent evaluations have begun to change this practice and have arguably improved the quality of impact evaluations in terms of their relevance, the inferences that are drawn from them and their applicability to policymakers and programme implementers. This includes the use of innovative techniques to form the specific evaluative questions being asked and tested, to gather the right type of data and information on outcomes and intermediating variables, to explain findings and to disseminate them to the appropriate decision-makers. This paper will review this work. It will canvass a purposeful sample of experts from a variety of disciplines to gather the success stories, and where apparently well-planned approaches have failed to add the value expected of them. It will then draw lessons for future evaluations as a basis for guidance on the use of mixed methods.
APA, Harvard, Vancouver, ISO, and other styles
10

Hamid, Shahirah, ed. Special Report: Your right to information. Monash University, 2022. http://dx.doi.org/10.54377/a967-b104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography