Academic literature on the topic 'SPECIAL DATA PROTECTION'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SPECIAL DATA PROTECTION.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SPECIAL DATA PROTECTION"

1

Anjawai, Namrysilia Buti, F. Yudhi Priyo Amboro, and Rufinus Hotmaulana Hutauruk. "Perbandingan Perlindungan Hukum Terkait Data Pribadi di Indonesia dan Jerman." AL-MANHAJ: Jurnal Hukum dan Pranata Sosial Islam 4, no. 2 (2022): 207–18. http://dx.doi.org/10.37680/almanhaj.v4i2.1791.

Full text
Abstract:
Protection of personal data is a human right that must be given legal protection. However, Indonesia does not yet have special rules governing the protection of personal data and the Personal Data Protection Supervisory Agency. As for when compared to Germany, which has special rules regarding the protection of personal data in full to the Institution that oversees the implementation of the rules for protecting Personal Data. The research method used by the author is a legal comparison method with the type of research being normative research. The author uses secondary data to analyze the resu
APA, Harvard, Vancouver, ISO, and other styles
2

Rahmah, Siti, Darmiwati, and Fitri Wahyuni. "Perlindungan Hukum Terhadap Data Pribadi di Era Big Data." Jurnal Indragiri Penelitian Multidisiplin 4, no. 3 (2024): 43–50. https://doi.org/10.58707/jipm.v4i3.1043.

Full text
Abstract:
The increasingly massive use of information and communication technology has raised concerns about protecting personal data in the era of big data which can harm individuals. Big Data as a form of technological development has not been balanced with developments in legal regulations, so there is no harmony between the use of Big Data and legal regulations related to the protection of personal data. Regulations related to the protection of personal data that already exist in Indonesia cannot guarantee and protect confidentiality and overcome the problem of protecting citizens' personal data. Th
APA, Harvard, Vancouver, ISO, and other styles
3

Lestari, Yuliannova, and M. Misbahul Mujib. "Optimizing Personal Data Protection Legal Framework in Indonesia (a Comparative Law Study)." Supremasi Hukum: Jurnal Kajian Ilmu Hukum 11, no. 2 (2022): 203. http://dx.doi.org/10.14421/sh.v11i2.2729.

Full text
Abstract:
This study explores the protection of personal data-appealing discourse these days. Globally, 132 countries already have special arrangements to protect personal data. The Bill on the Protection of Personal Data in Indonesia is already in the National Legislation Program. Indonesia does not yet have special regulations regarding protecting personal data. Furthermore, it also discussed personal data protection regulations in several countries, both Europe and Asia. This study uses a comparative study that compares personal data protection among countries for further studies on what matters shou
APA, Harvard, Vancouver, ISO, and other styles
4

Pusztahelyi, Réka, and Ibolya Stefán. "Household Social Robots − Special Issues Relating to Data Protection." Acta Universitatis Sapientiae, Legal Studies 11, no. 1 (2022): 95–118. http://dx.doi.org/10.47745/ausleg.2022.11.1.06.

Full text
Abstract:
Household social robots may have massive effects on our everyday lives and raise several concerns on data protection and privacy. The main characteristic of these devices is their capability of building close connections, even emotional bonds between humans and robots. The socially interactive robots exhibit human social characteristics, e.g. express and/or perceive emotions, communicate with high-level dialogue, etc. Affective computing permits development of AI systems that are capable of imitating human traits (emotions, speech, body language). The goal is to gain the trust of humans, to im
APA, Harvard, Vancouver, ISO, and other styles
5

Novikov, Petr Aleksandrovich. "Improving the mechanism of protection of a special category of personal data." Право и политика, no. 2 (February 2025): 65–77. https://doi.org/10.7256/2454-0706.2025.2.73265.

Full text
Abstract:
With the constant growth of digitalization and the use of various electronic platforms, any data leaves behind traces of information that relate to both publicly available and special categories of data. The article discusses the problems of protecting special categories of personal data in the context of digitalization and growing threats to information security. The regulatory framework of the Russian Federation, as well as international standards such as the General Data Protection Regulation, are analyzed in order to identify deficiencies in the protection of highly sensitive data, includi
APA, Harvard, Vancouver, ISO, and other styles
6

Hidayah, Ardhiana, and Marsitiningsih Marsitiningsih. "Aspek Hukum Perlindungan Data Konsumen E-Commerce." Kosmik Hukum 20, no. 1 (2020): 56. http://dx.doi.org/10.30595/kosmikhukum.v20i1.8251.

Full text
Abstract:
Consumer data protection is part of the consumer protection aspect of online transactions or e-commerce activities. This research is a normative legal research based on library research. This study aims to know and understand that personal data is part of the constitutional rights of citizens, so that the state is obliged to protect dignity, respect and integrity of consumers as human beings. The use of any information through electronic media that involves a person's personal data must be done with the consent of the person concerned. The misuse of consumer data is a major problem in legal pr
APA, Harvard, Vancouver, ISO, and other styles
7

Smyr, Daria, and Ekaterina Ulianova. "Legal Issues of Children’s Personal Data Protection." Open Journal for Legal Studies 5, no. 1 (2022): 1–10. http://dx.doi.org/10.32591/coas.ojls.0501.01001s.

Full text
Abstract:
The article deals with the problems of protecting the information privacy of minors in the online gaming sector. The authors analyze core approaches and methods of collection and processing of minors’ personal data, special regulation of data processing of children’s audience in light of some private company’s experience, current liability practices, and also offers a set of legislative measures to improve the effectiveness of children’s data protection both at the international and national level, measures for implementation of data subject rights.
APA, Harvard, Vancouver, ISO, and other styles
8

Bissaliyev, Marlen Sakenovich, and Karimzhan Nurumovich Shakirov. "SONAL DATA OF LEGAL ENTITIES AS A POTENTIAL SPECIAL OBJECT OF LEGAL PROTECTION IN CYBERSPACE." Bulletin of the Institute of Legislation and Legal Information of the Republic of Kazakhstan 2, no. 73 (2023): 42–52. http://dx.doi.org/10.52026/2788-5291_2023_73_2_42.

Full text
Abstract:
The article examines the main approaches to the personal data of legal entities as a potential special object of legal protection in cyberspace. The arguments for and against providing legal protection to legal entities' data of this type are presented. The article proposes its arguments for the impossibility of protecting the personal information of legal entities through the existing system of legal norms regulating the protection of personal data of citizens, based on the recognized theory of the essence of a legal entity, the goals of its identification, and taking into account the ultimat
APA, Harvard, Vancouver, ISO, and other styles
9

Bogosavljević, Mirjana. "Protection of Personal Data in Documents: Application of the Law on Personal Data Protection in Serbia and Abroad." Moderna arhivistika 2, no. 1 (2019): 106–15. http://dx.doi.org/10.54356/ma/2019/ghkv7413.

Full text
Abstract:
The rapid and continuous development of information technologies that encompasses almost all spheres of social life, imposes the key issue of protecting the privacy personal data, the issue of their availability, the way of their storage, processing, transmission and use. The contemporary concept of privacy puts emphasis on information control, security and data protection in computer information systems. Protection of privacy primarily concerns the issue of protection against abuse, fraud, embezzlement and deliberate or accidental damage. This paper covers several key issues: what are the mec
APA, Harvard, Vancouver, ISO, and other styles
10

Harahap, Muhammad Anwar Natama, and Harisman Harisman. "UNESCO'S ROLE REGARDING THE PROTECTION OF CULTURAL OBJECTS RECEIVING SPECIAL PROTECTION." Legal Standing : Jurnal Ilmu Hukum 8, no. 2 (2024): 431–43. http://dx.doi.org/10.24269/ls.v8i2.9490.

Full text
Abstract:
The purpose of this writing is to determine UNESCO's role in protecting cultural objects that receive special protection by formulating a problem, namely: what is UNESCO's role in protecting cultural objects that receive special protection? The type of research used in this research is normative juridical. The data source used in this research uses secondary data. Qualitative analysis was carried out with an empirical starting point. The results of this research show that there are still limitations in safeguarding and regulating cultural heritage. Cultural heritage preservation is very import
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "SPECIAL DATA PROTECTION"

1

Lukacs, Adrienn. "Protection of employees' right to privacy and right to data protection on social network sites : with special regard to France and Hungary." Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01D041.

Full text
Abstract:
Les sites de réseaux sociaux en ligne ont acquis une importance considérable dans la vie quotidienne. Leur utilisation conduit à une circulation sans précédent de données personnelles : des individus du monde entier partagent des données à caractère personnel dans une qualité et une quantité jamais vues auparavant. Parmi les utilisateurs de ces réseaux sociaux en ligne se trouvent des salariés et des candidats à l’embauche. Cela pose des problèmes spécifiques dans le contexte de l'emploi en ce qui concerne la vie privée et la protection des données. Bien que les moyens « traditionnels » de sur
APA, Harvard, Vancouver, ISO, and other styles
2

van, Meurs Philip. "Technology, society and democracy : the social impact of, and democratic control over, technology, with special reference to information technology and data protection." Thesis, London School of Economics and Political Science (University of London), 1990. http://etheses.lse.ac.uk/3051/.

Full text
Abstract:
Certain developments and applications of science and technology are often seen as a problem for society. The first chapter of this work concentrate on what technology actually is, its relation with science and the problems it creates for society. Two questions are asked: 1. Is democratic control of technological research and development necessary and possible. 2. Is democratic control of the applications of this research and development necessary and possible. A broad definition of technology brings out the relation of science and technology. The key concept is: control over nature, non-human
APA, Harvard, Vancouver, ISO, and other styles
3

Almlöf, Frida. "The Right to be Forgotten : The Extraterritorial Reach of EU Data Protection Law with Special Regard to the Case of Google v CNIL." Thesis, Uppsala universitet, Juridiska institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-357205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kon, Kam King Guillaume. "Revisiting Species Sensitivity Distribution : modelling species variability for the protection of communities." Thesis, Lyon 1, 2015. http://www.theses.fr/2015LYO10194/document.

Full text
Abstract:
La SSD (Species Sensitivity Distribution) est une méthode utilisée par les scientifiques et les régulateurs de tous les pays pour fixer la concentration sans danger de divers contaminants sources de stress pour l'environnement. Bien que fort répandue, cette approche souffre de diverses faiblesses sur le plan méthodologique, notamment parce qu'elle repose sur une utilisation partielle des données expérimentales. Cette thèse revisite la SSD actuelle en tentant de pallier ce défaut. Dans une première partie, nous présentons une méthodologie pour la prise en compte des données censurées dans la SS
APA, Harvard, Vancouver, ISO, and other styles
5

Di, Maggio Antonia. "Les atteintes aux systèmes de traitement automatisé de données : harmonisation et coopération en Europe." Electronic Thesis or Diss., Corte, 2022. http://www.theses.fr/2022CORT0014.

Full text
Abstract:
Les systèmes informatiques sont des éléments essentiels de l'interaction politique, sociale et économique et sont devenus fondamentaux pour le développement et l'innovation. Ces systèmes sont pourtant autant de ressources qu'ils peuvent être vecteurs de menaces pour la sécurité, les droits et les libertés des utilisateurs. En effet, les atteintes aux systèmes de traitement automatisé de données se matérialisent par des procédés infractionnels divers, réalisés par des catégories d'auteurs variées et touchant de nombreuses victimes différentes telles que les particuliers, les entreprises, ou enc
APA, Harvard, Vancouver, ISO, and other styles
6

Makambila, Casimir. "Etude de l'anthracnose du manioc (manihot esculenta crantz) et son agent pathogene colletotrichum gloeosporioides penz f. Sp. Manihotis henn." Clermont-Ferrand 2, 1987. http://www.theses.fr/1987CLF2E385.

Full text
Abstract:
L'agressivite des souches de colletotrichum manihotis varie d'une souche a une autre et les cultivars de manioc inocules sont plus ou moins sensibles au champignon. La temperature et la lumiere exercent une action sur l'infection des tiges. In vitro la lumiere stimule ou inhibe, selon les temperatures la croissance en longeur des hyphes et la conidiogenese. Les radiations bleues, vertes et jaunes inhibent la croissance a 32 non=c. , les radiations rouges stimulent la croissance a des temperatures comprises entre 20 et 28 non=c. La conidiogenese est inhibee a 20 non=c. Et stimulee a partir de 2
APA, Harvard, Vancouver, ISO, and other styles
7

Grobler, Cornelia Petronella. "A model to assess the Information Security status of an organization with special reference to the Policy Dimension." Thesis, 2008. http://hdl.handle.net/10210/488.

Full text
Abstract:
Information Security is becoming a high-priority issue in most organizations. Management is responsible for the implementation of security in the organization. Information Security is a multi-dimensional discipline. A well-defined Information Security Management strategy will enable managers to manage security effectively and efficiently in the organization. Management must be able to assess the current security status of the organization. Currently, no comprehensive, integrated assessment tool or model exists to assess the total security posture of an organization. The study will address the
APA, Harvard, Vancouver, ISO, and other styles
8

Van, Meurs Philip. "Technology, society and democracy the social impact of, and democratic control over technology, with special reference to information technology and data protection /." 1989. http://catalog.hathitrust.org/api/volumes/oclc/31467693.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ling, Jing-Ting, and 林敬庭. "The ambiguity between Freedom of Information and Personal Data Protection - a comparative analysis on government website disclosure among six special municipalities." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/u6tbg2.

Full text
Abstract:
碩士<br>國立政治大學<br>公共行政學系<br>107<br>Freedom of information in the government serves the function of fulfilling the proposed public values such as transparency, openness, accountability, and responsiveness. Provision of complete contact information for public servants on government websites is a worldwide trend. Nevertheless, such practice raises the concern that public servants’ personal information might be trespassed accordingly. By analyzing the contents of government websites for all six special municipalities in Taiwan, this study found that Taipei City government provides the most complete
APA, Harvard, Vancouver, ISO, and other styles
10

Günzl, Bettina. "Erdflechten und ihre Gesellschaften in Nordhessen mit besonderer Berücksichtigung der morphologischen und genetischen Variabilität bei Cladonia furcata (Hudson) Schrader." Doctoral thesis, 2004. http://hdl.handle.net/11858/00-1735-0000-0006-B678-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "SPECIAL DATA PROTECTION"

1

Schalkwyk, Leani Marlie Van. The protection of commercial information in electronic communications with special reference to the internet. UV/UFS, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Munir, Abu Bakar. Privacy and data protection: A comparative analysis with special reference to the Malaysian proposed law. Sweet & Maxwell Asia, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Office, General Accounting. Critical infrastructure protection: Comprehensive strategy can draw on Year 2000 experiences : report to the Chairman, Special Committee on the Year 2000 Technology Problem, U.S. Senate. The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

SecTech 2008 (2008 Sanya Shi, China). Advances in security technology: International conference, SecTech 2008, and its special sessions, Sanya, Hainan Island, China, December 13-15, 2008 : revised selected papers. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Michael, James. Privacy and human rights: An international and comparative study, with special reference to developments in information technology. UNESCO, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hoepman, Jaap-Henk. Radio Frequency Identification. Security and Privacy Issues: 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cavallaro, Lorenzo. Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Helger, Lipmaa, and SpringerLink (Online service), eds. E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Christof, Paar, and SpringerLink (Online service), eds. RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "SPECIAL DATA PROTECTION"

1

Voigt, Paul, and Axel von dem Bussche. "Special Data Processing Activities." In The EU General Data Protection Regulation (GDPR). Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57959-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Voigt, Paul, and Axel von dem Bussche. "Special Data Processing Operations." In The EU General Data Protection Regulation (GDPR). Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62328-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gurkov, Alexander. "Personal Data Protection in Russia." In The Palgrave Handbook of Digital Russia Studies. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42855-6_6.

Full text
Abstract:
AbstractThis chapter considers the legal framework of data protection in Russia. The adoption of the Yarovaya laws, data localization requirement, and enactment of sovereign Runet regulations allowing for isolation of the internet in Russia paint a grim representation of state control over data flows in Russia. Upon closer examination, it can be seen that the development of data protection in Russia follows many of the steps taken at the EU level, although some EU measures violated fundamental rights and were invalidated. Specific rules in this sphere in Russia are similar to the European Gene
APA, Harvard, Vancouver, ISO, and other styles
4

Feth, Denis, Christian Jung, and Andreas Eitel. "Concepts for Data Sovereignty in Digital Value Chains: Data Cockpits—Data Usage Control—Data Trustees." In New Digital Work II. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-69994-8_5.

Full text
Abstract:
Abstract Digital value chains require the exchange of data. This data is always sensitive in one way or another—whether due to data protection, trade secret protection, or the very individual protection needs of data providers and data consumers along the value chain. It is therefore important to preserve the data sovereignty of all parties involved in the value creation. This requires three solution blocks, which we address in this article: (1) offering user-friendly ways to express data sovereignty needs and understanding their consequences; (2) devising technologies to enforce these needs;
APA, Harvard, Vancouver, ISO, and other styles
5

Chu, Hoa. "Legal Framework for Personal Data Protection in Vietnam." In Smart Cities in Asia. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1701-1_8.

Full text
Abstract:
AbstractBuilding a smart city demands the digital transformation of government working processes and procedures, including the digitization and online execution of most administrative procedures. In practice, smart city governance uses information technology to increase the efficacy and efficiency of providing services to the public. The development of smart cities raises concerns among city residents about transparency in data collection and use of personal data. When governments implement smart city projects, sensors and closed-circuit television (CCTV) are placed in most streets, commercial
APA, Harvard, Vancouver, ISO, and other styles
6

Demchenko, Yuri, Cees de Laat, Wouter Los, and Leon Gommans. "Defining Platform Research Infrastructure as a Service (PRIaaS) for Future Scientific Data Infrastructure." In Designing Data Spaces. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_15.

Full text
Abstract:
AbstractModern science increasingly works with large amount of data, which are heterogeneous, are distributed, and require special infrastructure for data collection, storage, processing, and visualization. Science digitalization, likewise industry digitalization, is facilitated by the explosive development of digital technologies and cloud-based infrastructure technologies and services. This paper attempts to understand impact and new requirements to the future Scientific Data Infrastructure imposed by growing science digitalization. The paper presents two lines of analysis: one is a retrospe
APA, Harvard, Vancouver, ISO, and other styles
7

Barbosa, Carla, and Andreia da Costa Andrade. "Biobanks and GDPR: A Look at the Portuguese Panorama." In GDPR and Biobanking. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49388-2_19.

Full text
Abstract:
AbstractThe need for the existence of biobanks for health research purposes is something of which government authorities have been aware for several years. One year after the full entry into force of the GDPR, the Portuguese legislature has finally passed the law that ensures the full implementation of the data protection regime’s points left open by the European legislature. However, Portugal has also in place a range of legislation regulating the establishment and functioning of biobanks. The regulation of biobanks for research purposes imposes special protection duties on scientific researc
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Qiuna, Jingyuan Shi, and Yueyuan Zhao. "The Modular Protection and Design Method of Traditional Residential Buildings in Bayu Ancient Town." In Novel Technology and Whole-Process Management in Prefabricated Building. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-5108-2_43.

Full text
Abstract:
AbstractThis paper analyzes the current problems of the serious damage to the common dwellings and historical key buildings in Bayu ancient town and the insufficient understanding of the complexity of the protection work, established the basic idea of traditional residential building modular protection design, and further proposed the specific modular protection method which is composed of current building element data collation, common residential type renovation design, and special building type key design. The longtan Ancient Town in Chongqing is taken as an example for research and explora
APA, Harvard, Vancouver, ISO, and other styles
9

Lunchick, Curt, Gary Burin, Joseph C. Reinert, and Karen E. Warkentien. "The Environmental Protection Agency's Use of Biological Monitoring Data for the Special Review of Alachlor." In Biological Monitoring for Pesticide Exposure. American Chemical Society, 1988. http://dx.doi.org/10.1021/bk-1988-0382.ch025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Čtvrtník, Mikuláš. "Personality Rights, Privacy, and Post-mortem Privacy Protection in Archives: International Comparison, Germany and “Protection of Legitimate Interests”." In Archives and Records. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-18667-7_2.

Full text
Abstract:
AbstractThis chapter together with Chaps. 3 and 4, will address the protection of personality rights in archives in the broader context of the issue of access to archival records, and in some respects also on the general level of the protection of information not only of personal nature. In doing so, it will focus on several selected specific situations, models, or special procedural settings that can be encountered in the archival systems of some countries, namely the United Kingdom, Germany, and France, and it will also touch on the situation in the USA and some other countries that may also
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SPECIAL DATA PROTECTION"

1

Jung, Yoongun, Seokjun Kang, Kwanghyun Kim, et al. "Transient Stability Data Driven Special Protection Scheme Using Deep Reinforcement Learning." In 2024 13th International Conference on Renewable Energy Research and Applications (ICRERA). IEEE, 2024. https://doi.org/10.1109/icrera62673.2024.10815587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rosanova, Giuseppe. "ENERGY SMART GRIDS AND SUSTAINABLEDEVELOPMENT: THE PRINCIPLE OF "MAXIMUM DATA PROTECTION"." In 11th SWS International Scientific Conferences on SOCIAL SCIENCES - ISCSS 2024. SGEM WORLD SCIENCE, 2024. https://doi.org/10.35603/sws.iscss.2024/vs03/23.

Full text
Abstract:
The paper addresses the impact of smart grids on the energy sector and personal rights. Renewable conversion of the energy cycle has been deemed insufficient over time, and the production perspective has been complemented by innovation and research that have changed the transition process, which now also involves the digitization of the entire electricity system. Sustainable development is also technological, incorporating both the energy transition and the digital transition, aimed at creating an efficient electricity system that can reduce consumption, lower energy prices, protect the enviro
APA, Harvard, Vancouver, ISO, and other styles
3

Thompson, N. G., and B. C. Syrett. "Relevancy of Pitting and Protection Potentials." In CORROSION 1990. NACE International, 1990. https://doi.org/10.5006/c1990-90147.

Full text
Abstract:
Abstract A literature review was performed to identify test methods that have been used to examine pitting susceptibility of stainless steels and nickel-base alloys in chloride (Cl) containing environments. Several techniques were identified and a critical discussion of the electrochemical methods is provided with special attention given to the causes of variations observed in the pitting, or breakdown, potential (Epit) and the protection, or repassivation, potential (Eprot). Experiments were performed for Type 317L stainless steel and Alloy G3 in solutions containing high levels of Cl. The te
APA, Harvard, Vancouver, ISO, and other styles
4

Bukhamsin, A. A. "Field Evaluation of Cathodic Protection Remote Monitoring Systems at Oil Facilities." In CORROSION 2009. NACE International, 2009. https://doi.org/10.5006/c2009-09542.

Full text
Abstract:
Abstract In recent years the Middle East oil industry has seen tremendous growth in oil producing and handling facilities, matched by an increased number of Cathodic Protection installations. The monitoring of large numbers of new CP systems presents special challenges to CP operators and with Remote Monitoring System, these challenges can be overcome. This paper discussed the advantages of having RMS to remotely monitor the CP system and have readily available data for CP reports and system evaluation.
APA, Harvard, Vancouver, ISO, and other styles
5

Naha, Prantosh, Nadeem J. Sait, Y. M. Salim, and Vaseem J. Sait. "Case Study on Caisson & Piston Cylinder Protection Failure." In CONFERENCE 2023. AMPP, 2023. https://doi.org/10.5006/c2023-19340.

Full text
Abstract:
Abstract The aim of this paper is to discuss the existing design, develop &amp; install a reliability improvement &amp; monitoring system for the special casting facility (caisson and cylinder) equipped with a large size buried cylinder structure (approx. 12 m stroke length 1.1 m rod diameter) which is used for the movement of the entire casting table at the facility of one of the major producers of aluminum in the world. In order to protect the structural integrity as well as to prevent corrosion from electrolytes, the protective shell, called caisson, around the underground part of the cylin
APA, Harvard, Vancouver, ISO, and other styles
6

Mansfeld, Florian. "Evaluation of Corrosion Protection Methods with Electrochemical Impedance Spectroscopy." In CORROSION 1987. NACE International, 1987. https://doi.org/10.5006/c1987-87481.

Full text
Abstract:
Abstract The application of electrochemical impedance spectroscopy (EIS) in the evaluation of corrosion protection methods has resulted in a better understanding of the mechanisms of corrosion inhibition and protection of metals by polymer coatings and anodic films. Following a brief discussion of the special requirements for the recording of impedance spectra for corroding systems over a wide range of frequencies and impedances, examples for typical EIS-data obtained by the author and his co-workers are presented. Corrosion inhibition is discussed for acid media, where interface inhibition oc
APA, Harvard, Vancouver, ISO, and other styles
7

Corbett, Richard A. "Cathodic Protection of a Nuclear Fuel Facility." In CORROSION 1988. NACE International, 1988. https://doi.org/10.5006/c1988-88233.

Full text
Abstract:
Abstract Over the past 100 years, many presentations have been made, and papers published, on the corrosion of buried metallic structures. This corrosion is due to the electrochemical activity of the surrounding soil. Since the characteristics of the soil play an important role in the rate of attack, it is essential that serious considerations be given to on-site soil characteristics, prior to construction or modification of any facility. Nuclear facilities are particularly under severe scrutiny by a concerned populous. Leaking underground pipes or storage tanks, which may or may not contain r
APA, Harvard, Vancouver, ISO, and other styles
8

Pourbaix, A., and PH Carpentiers. "A Coordinate System for Field Corrosion Control: Monitoring Electrical Interference." In CORROSION 1987. NACE International, 1987. https://doi.org/10.5006/c1987-87323.

Full text
Abstract:
Abstract Problems are currently encountered in cathodic protection, due to electrical interference in congested areas with many buried structures and with DC powered transit systems. Belgium is a typical example of a busy area in that respect. Systems were recently developed to improve the quality of the surveillance and the corrosion control of underground structures: new instrumentation improves the corrosion monitoring at a reduced cost; computer programmes help to analyse data and to select the protection measures to minimize interference; special probes help to assess the corrosion risk a
APA, Harvard, Vancouver, ISO, and other styles
9

Furman, Alla Y., Margarita Kharshan, and Christophe J. Chandler. "Performance and Testing of Vapor Phase Corrosion Inhibitors." In CORROSION 2004. NACE International, 2004. https://doi.org/10.5006/c2004-04418.

Full text
Abstract:
Abstract Vapor Corrosion Inhibitors (VCIs) possess the appreciable pressure of saturated vapors under normal atmospheric conditions. These vapors enrich the metal surface and provide corrosion protection by adsorption on it. Corrosion testing can be performed in the laboratory under controlled conditions and in the field under natural or service conditions. In both the laboratory and field tests, corrosion rate can be evaluated by the direct determination of the metal loss or by measuring of corrosion current, corrosion potential, polarization resistance, and other electrochemical corrosion ch
APA, Harvard, Vancouver, ISO, and other styles
10

Polyakov, S. G. "Electrochemical Monitoring in Corrosion Protection of Welded Pipelines." In CORROSION 2001. NACE International, 2001. https://doi.org/10.5006/c2001-01610.

Full text
Abstract:
Abstract Consideration is given to corrosion monitoring of the outside surface of walls of main pipelines. Results obtained by using the above method were checked under laboratory and field conditions. The procedure for measuring the rate of soil corrosion of the pipeline metal was optimized. Measurements were made using the two- and three-electrode measuring diagrams under potentiostatic and potentiodynamic conditions. The method based on measuring corrosiveness of soil for a pipe laid down at different levels, and the rate of residual corrosion of the pipeline metal was developed to characte
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SPECIAL DATA PROTECTION"

1

Minero Alejandre, Gemma. Ownership of Databases: Personal Data Protection and Intellectual Property Rights on Databases. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64578.

Full text
Abstract:
When we think on initiatives on access to and reuse of data, we must consider both the European Intellectual Property Law and the General Data Protection Regulation (GDPR). The first one provides a special intellectual property (IP) right – the sui generis right – for those makers that made a substantial investment when creating the database, whether it contains personal or non-personal data. That substantial investment can be made by just one person, but, in many cases, it is the result of the activities of many people and/or some undertakings processing and aggregating data. In the modern di
APA, Harvard, Vancouver, ISO, and other styles
2

Thompson and Lawson. L51792 External Corrosion Control Monitoring Practices - Volumes I and II. Pipeline Research Council International, Inc. (PRCI), 2000. http://dx.doi.org/10.55274/r0010173.

Full text
Abstract:
The primary means of corrosion control for buried pipelines is the use of an external pipeline coating and the application of cathodic protection (CP). Monitoring the effectiveness of the corro sion control system is critical to the safe operation of natural gas pipelines. NACE International has established criteria andrecommended practices for monitoring the effectiveness of CP systems (RPO169-96). These practices and criteria have generally been accepted by regulatory agencies. Over the years a significant amount of research has been performed that is related to monitoring practices. Much of
APA, Harvard, Vancouver, ISO, and other styles
3

Bruce, Berg, and Agrawald. L52304 Development of Criteria-Guidelines for Welding Onto In-Service Chemical Pipelines. Pipeline Research Council International, Inc. (PRCI), 2009. http://dx.doi.org/10.55274/r0010678.

Full text
Abstract:
Welding onto in-service pipelines and piping systems allows cost-effective installation of branchconnections (hot taps) and repair sleeves. Beyond the normal in-service welding concerns ofburnthrough and hydrogen cracking, there are often additional concerns when welding ontopipelines and piping systems in chemical service. For example, some products can undergochemical changes when exposed to the heat from an in-service weld. In spite of these concerns,some companies routinely weld on lines in chemical and other potentially hazardous service,although limitations and special precautions are of
APA, Harvard, Vancouver, ISO, and other styles
4

Albert, Jose Ramon. Poverty Transitions and the Near-Poor in the Philippines. Philippine Institute for Development Studies, 2023. http://dx.doi.org/10.62986/dp2023.27.

Full text
Abstract:
This study provides an in-depth analysis of poverty dynamics in the Philippines, focusing on the period from 2003 to 2009. Utilizing panel data from the Family Income and Expenditure Survey (FIES) to examine transitions into and out of poverty, it pays special attention to the near-poor population—those whose incomes hover just above the poverty line. Despite the Philippines experiencing an average growth of 4.8 percent in real gross domestic product during this period, the overall poverty incidence remained stagnant, highlighting a disconnect between economic growth and poverty reduction. Thi
APA, Harvard, Vancouver, ISO, and other styles
5

Price, Roz. Informality and Marginalised Groups in Crisis Response. Institute of Development Studies, 2023. http://dx.doi.org/10.19088/core.2023.002.

Full text
Abstract:
The Covid-19 pandemic had ripple effects that extend beyond the domain of health risks into economic, social, and political domains. These effects were not evenly distributed and exacerbated existing societal inequalities and marginalisation (UNDRR and UNU-EHS 2022: 11). Informal and migrant workers, and those living in informal settlements, were disproportionately affected by the health and secondary impacts of the pandemic, which further impacted their livelihoods and ability to meet basic needs, and constrained their ability to recover given the coping mechanisms they had to adopt (Chen et
APA, Harvard, Vancouver, ISO, and other styles
6

Thomas, Meinzen, Diane M. Debinski, Laura A. Burkle, and Robert J. Ament. Identifying Patterns, Protecting Monarchs, and Informing Management. Idaho Transportation Department, 2023. http://dx.doi.org/10.15788/1691525473.

Full text
Abstract:
Pollinating insects provide vital ecosystem services and are facing global declines and habitat loss . Roadsides are increasingly regarded as important potential areas for enhancing pollinator habitat. Understanding which roadsides best support pollinators — and why — is essential to helping locate and prioritize pollinator conservation efforts across roadside networks. To support this effort, we assessed butterfly, bee, and flowering plant species richness and abundance on a set of 63 stratified randomized roadside transects in State -managed rights -of -way in SE Idaho. Our research evaluate
APA, Harvard, Vancouver, ISO, and other styles
7

Ron, Eliora, and Eugene Eugene Nester. Global functional genomics of plant cell transformation by agrobacterium. United States Department of Agriculture, 2009. http://dx.doi.org/10.32747/2009.7695860.bard.

Full text
Abstract:
The aim of this study was to carry out a global functional genomics analysis of plant cell transformation by Agrobacterium in order to define and characterize the physiology of Agrobacterium in the acidic environment of a wounded plant. We planed to study the proteome and transcriptome of Agrobacterium in response to a change in pH, from 7.2 to 5.5 and identify genes and circuits directly involved in this change. Bacteria-plant interactions involve a large number of global regulatory systems, which are essential for protection against new stressful conditions. The interaction of bacteria with
APA, Harvard, Vancouver, ISO, and other styles
8

DeVivo, Joe. State, Territory, and NatureServe Conservation Listing Status of Taxa in National Park Service Units for use in Determining Appropriate Release of Data. National Park Service, 2023. http://dx.doi.org/10.36967/2272465.

Full text
Abstract:
In 2013, Executive Order 13642, Making Open and Machine Readable the New Default for Government Information (GPO 2013), and associated policies issued by the Office of Management and Budget (OMB 2013) mandated that all data be made public by default unless those data are protected from release by one or more authorities. Staff at all National Park Service (NPS) units where the Inventory &amp; Monitoring Division conducts activities identified resources that warrant some level of data protection, and default rules to be used when disseminating information about those resources. In nearly all ca
APA, Harvard, Vancouver, ISO, and other styles
9

Curtis, Rob, Sonia Bingham, and Megan Shaeffer. Natural resource assessment of the proposed Columbia Sensitive Resource Zone, Cuyahoga Valley National Park, Ohio. National Park Service, 2025. https://doi.org/10.36967/2310114.

Full text
Abstract:
From 2021 – 2023, Cuyahoga Valley National Park (CUVA) and Summit Metro Parks (SMP) worked collaboratively through an interagency agreement to inventory and classify natural and cultural resources in an ecologically sensitive zone around Blue Hen Falls and Columbia Picnic area. Increased visitation in recent years created safety concerns, trail erosion and damage to sensitive resources and locally rare habitats. At the time of this study, these areas were located within one of CUVA’s management areas proposed as a Sensitive Resource Zone (SRZ), specifically the Columbia SRZ. The SRZ designatio
APA, Harvard, Vancouver, ISO, and other styles
10

Douglas, Kristin, Eugenia Naro-Maciel, Ana Porzecanski, and Patrick Shea. What’s in the Water? Using environmental DNA for Marine Monitoring and Planning. American Museum of Natural History, 2020. http://dx.doi.org/10.5531/cbc.ncep.0011.

Full text
Abstract:
Coral reefs, the most biodiverse of all marine ecosystems, are of high ecological, cultural, and financial importance, yet they are declining on a global scale due to several anthropogenic factors. Current threats to coral reefs highlight the urgent need for effective research, monitoring, and management of these ecosystems. In this case study-based exercise, students will compare and contrast biodiversity information about Hawaiian reefs between traditional diver surveys and eDNA based applications, consider the benefits and limitations of each method for coral reef fish monitoring, and use t
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!