دانلود و نمایش مقالات مرتبط با personal data::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - personal data

تعداد مقالات یافته شده: 56
ردیف عنوان نوع
1 Smart mask – Wearable IoT solution for improved protection and personal health
ماسک هوشمند – راه حل پوشیدنی اینترنت اشیا برای بهبود حفاظت و سلامت شخصی-2022
The use of face masks is an important way to fight the COVID-19 pandemic. In this paper, we envision the Smart Mask, an IoT supported platform and ecosystem aiming to prevent and control the spreading of COVID-19 and other respiratory viruses. The integration of sensing, materials, AI, wireless, IoT, and software will help the gathering of health data and health-related event detection in real time from the user as well as from their environment. In the larger scale, with the help of AI-based analysis for health data it is possible to predict and decrease medical costs with accurate diagnoses and treatment plans, where the comparison of personal data to large-scale public data enables drawing up a personal health trajectory, for example. Key research prob- lems for smart respiratory protective equipment are identified in addition to future research di- rections. A Smart Mask prototype was developed with accompanying user application, backend and heath AI to study the concept.
keywords: کووید-۱۹ | محاسبات لبه | اینترنت اشیا | سلامت شخصی | پوشیدنی | COVID-19 | Edge computing | IoT | Personal health | Wearable
مقاله انگلیسی
2 An extensive survey on finger and palm vein recognition system
یک بررسی گسترده در مورد سیستم تشخیص ورید انگشت و کف دست-2021
The evolution of the internet drastically increases the utilization of online data, which needs security using unique identification. The traditional methods of security, such as password, personal identification number (PIN), could not reach the user-friendly requirement of the users. There is a necessity to provide high security for the data by using a unique identification system. Today, in many situations, biometrics plays a crucial role in today’s authentication and recognition. Biometrics deals with unique physical and behavioral characteristics. Fingerprint, face recognition, iris/ retinal recognition, voice recognition and vein recognition are some of the biometrics which is used for authentication purpose. In this paper, we highlight different processes that involve finger veins and palm veins recognition and authentication. These finger and palm vein is identified as one of the important unique identifications that can be used for the authentication which provide the security for the important personal data. In this study, we noticed that the advantage of using a vein for the authentication process is that it provides high security because it can be detected even when a finger or palm got injured, and it works only when the person is alive otherwise the authentication fails.© 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the International Conference on Advances in Materials Research – 2019.
Keywords: Authentication | Biometrics | Finger recognition | Palm vein recognition | Personal identification number
مقاله انگلیسی
3 IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic
آدرسهای IP در زمینه شواهد دیجیتالی در پرونده کیفری و مدنی جمهوری اسلواکی-2020
Use of IP addresses by courts in their decisions is one of the issues with growing importance. This applies especially at the time of the increased use of the internet as a mean to violate legal provisions of both civil and criminal law. This paper focuses predominantly on two issues: (1) the use of IP addresses as digital evidence in criminal and civil proceedings and possible mistakes in courts approach to this specific evidence, and (2) the anonymisation of IP addresses in cases when IP addresses are to be considered as personal data. This paper analyses the relevant judicial decisions of the Slovak Republic spanning the time period from 2008 to 2019, in which the relevant courts used the IP address as evidence. On this basis, the authors formulate their conclusions on the current state and developing trends in the use of digital evidence in judicial proceedings. The authors demonstrate the common errors that occur in the courts’ decisions as regards the use of IP addresses as evidence in the cases of the IP addresses anonymisation, usage of the in dubio pro reo principle in criminal proceedings, and the relationship between IP addresses and devices and persons.
Keywords: IP address | Digital evidence | Criminal and civil proceedings | Privacy | Personal data | Anonymisation
مقاله انگلیسی
4 Addressing AI ethics through codification
پرداختن به اخلاق هوش مصنوعی از طریق تدوین-2020
AI ethics rapidly becomes one of the most significant issues in assessing the impact of AI on social welfare and development. A technology that does not meet the ethical criteria of a society is likely to face a long and hard process of acceptance regardless of its potentially tremendous positive potential for long-term socio-economic development. The development of artificial intelligence (AI) technologies is undoubtedly associated with the need to answer ethical questions, and the perception of AI in society will be largely determined by compliance with ethical criteria, whether written or not. At the same time, AI as a technological system itself does not have a natural ethical content; the authors believe that in practice ethical concerns may be addressed by means of ethical codes and compliance rules that articulate what constitutes ethical behaviour in specific areas of application of AI systems. Such a set of rules (a code for AI ethics) could be followed by all actors throughout the complete lifecycle of the system starting with the design stage. The specification of general ethical principles as industry-specific codes of practice would also facilitate classification, evaluation and measurement of systems, both at the technical level and at the level of public perception and trust. The article considers examples of codification of ethical principles and offers several approaches for practical use in solving issues of ethics in the field of AI at the national and international level.
Keywords: ethics | AI | codification | regulation | standards | responsibility | bias | trustworthiness | personal data protection | international cooperation in AI | soft regulation
مقاله انگلیسی
5 Efficiency investigation and optimization of contract management business processes in a workwear rental and laundry service company
297-S235197892030843X-2020
The paper presents business processes business process models in the area of contract management in a workwear rental and laundry service company. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team consists of IT specialist, subject-matter experts and employees of the rental company. Business models presented in the article are described in accordance with the assumptions of BPMN (Business Process Model and Notation).The models of the rental company’s activities were created in the ARIS software environment, where the simulation of all necessary operations was carried out. As the result of simulation experiments a number of interesting parameters were obtained. There is no possibility to obtain these parameters in the static analysis of a business process. They can be only determined by the dynamic analysis. A sample results show the frequency of various significant events, accumulated time corresponding to activities performance, number of actions being performed by different people, overall working time for employees, the degree of the human factor use, and the global cost connected with different activities. The following process models have been developed, simulated and optimized: Release of an employee, Locker room change request, Clothing size change request for an employee, Cabinet location change request, Clothing sets amount change request, Personal data change, Employment process, Registration of the own clothing for an employee, New cabinet order, New set of keys set up, Transfer of an employee, Clothing repair request.© 2020 The Authors. Published by Elsevier B.V.This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)Peer-review under responsibility of the scientific committee of the 1st International Conference on Optimization-Driven Architectural Design
Keywords: automation | production planning | industrial enterprise | System Analysis and Program Development | mastering.
مقاله انگلیسی
6 Towards Security and Privacy for Edge AI in IoT/IoE based Digital Marketing Environments
به سمت امنیت و حفظ حریم خصوصی برای هوش مصنوعی لبه در محیط های بازاریابی دیجیتال مبتنی بر IoT / IoE-2020
Abstract—Edge Artificial Intelligence (Edge AI) is a crucial aspect of the current and futuristic digital marketing Internet of Things (IoT) / Internet of Everything (IoE) environment. Consumers often provide data to marketers which is used to enhance services and provide a personalized customer experience (CX). However, use, storage and processing of data has been a key concern. Edge computing can enhance security and privacy which has been said to raise the current state of the art in these areas. For example, when certain processing of data can be done local to where requested, security and privacy can be enhanced. However, Edge AI in such an environment can be prone to its own security and privacy considerations, especially in the digital marketing context where personal data is involved. An ongoing challenge is maintaining security in such context and meeting various legal privacy requirements as they themselves continue to evolve, and many of which are not entirely clear from the technical perspective. This paper navigates some key security and privacy issues for Edge AI in IoT/IoE digital marketing environments along with some possible mitigations.
Keywords: edge security | edge privacy | edge AI | edge intelligence | artificial intelligence | AI | machine learning | ML | IoT | IoE | edge | cybersecurity | legal | law | digital marketing | smart | GDPR | CCPA | security | privacy
مقاله انگلیسی
7 Options towards a global standard for the protection of individuals with regard to the processing of personal data
گزینه های استاندارد جهانی برای حفاظت از افراد در مورد پردازش داده های شخصی-2020
Purpose: States have adopted a number of international instrument dedicated in full or in part to privacy and data protection, at multilateral or regional levels, in binding or non-binding form. This article discusses the potential and context of the emergence of a possible global standard on data protection focusing on the 1981 Council of Europe Convention for the Protection of Individuals with Regard to the Processing of Personal Data, as amended (Convention 108+).
Aims: With due regard being paid to the dynamic technological and business environment that surrounds policy-making in the field of personal data protection, this article attempts to look at some strengths, weaknesses, opportunities and challenges of Convention 108+ in the competition for becoming a global standard. It seeks to identify possible future directions and priorities, taking into account the evolving nature of international relations in a more multipolar world where multilateralism is less obviously the preferred approach to international issues.
Findings: Informed by an in-depth study of relevant international instruments relating to the right to privacy this article explores several strengths and opportunities that may be built on to promote a global role for Convention 108+, but also some weaknesses and threats. In sum, it concludes that the Convention is relatively well placed to ambition becoming a global standard.
مقاله انگلیسی
8 Data protection law beyond identifiability? Atmospheric profiles, nudging and the Stratumseind Living Lab
قانون حفاظت از داده ها فراتر از قابلیت شناسایی؟ پروفایل های جوی، تلنگر زدن و آزمایشگاه زنده Stratumseind-2020
The deployment of pervasive information and communication technologies (ICTs) within smart city initiatives transforms cities into extraordinary apparatuses of data capture. ICTs such as smart cameras, sound sensors and lighting technology are trying to infer and affect persons’ interests, preferences, emotional states, and behaviour. It should be no surprise then that contemporary legal and policy debates on privacy in smart cities are dominated by a debate focused on data and, therefore, on data protection law. In other words, data protection law is the go-to legal framework to regulate data processing activities within smart cities and similar initiatives. While this may seem obvious, a number of important hurdles might prevent data protection law to be (successfully) applied to such initiatives. In this contribution, we examine one such hurdle: whether the data processed in the context of smart cities actually qualifies as personal data, thus falling within the scope of data protection law. This question is explored not only through a theoretical discussion but also by taking an illustrative example of a smart city-type initiative – the Stratumseind 2.0 project and its living lab in the Netherlands (the Stratumseind Living Lab; SLL). Our analysis shows that the requirement of ‘identifiability’ might be difficult to satisfy in the SLL and similar initiatives. This is so for two main reasons. First, a large amount of the data at stake do not qualify as personal data, at least at first blush. Most of it relates to the environment, such as, data about the weather, air quality, sound and crowding levels, rather than to identified or even likely identifiable individuals. This is connected to the second reason, according to which, the aim of many smart city initiatives (including the SLL) is not to identify and target specific individuals but to manage or nudge them as a multiplicity – a combination of the environment, persons and all of their interactions. This is done by trying to affect the ‘atmosphere’ on the street. We thus argue that a novel type of profiling operations is at stake; rather than relying on individual or group profiling, the SLL and similar initiatives rely upon what we have called ‘atmospheric profiling’. We conclude that it remains highly uncertain, whether smart city initiatives like the SLL actually process personal data. Yet, they still pose risks for a wide variety of rights and freedoms, which data protection law is meant to protect, and a need for regulation remains.
Keywords: Data protection | Personal data | Smart city | Profiling | Nudging | Stratumseind
مقاله انگلیسی
9 Human-centric data protection laws and policies: A lesson from Japan
قوانین و سیاست‌های حفاظت از داده‌های انسان محور: درسی از ژاپن-2020
This article examines the human dignity defined in Convention 108+ and, from a Japanese perspective, explores the possibility of a universal philosophy of data protection. The recent human resources scandal (the Rikunabi case) in Japan has made stakeholders to realise the importance of the basic philosophy of data protection. Convention 108+ declared ‘human dignity’ to prohibit an instrumental treatment of individuals in processing personal data, and thereby, in a positive sense, place the human in the centre of data processing cycle. Although there is no concept equivalent to ‘human dignity’ under the Japanese data protection laws, due to social norms in Japan, the human-centric approach is supported by recent Artificial Intelligence (AI) guidelines in Japan. The basic idea of the relationship between humans and machines is universal, even if the laws are local, in bridging the different legal regimes. The promise of Convention 108+ seems to take the processing of massive volumes of personal data, sorting out the individuals, and standardising the personality as its specific targets, and the defence of digital humanity as its noble ideal. In this sense, Convention 108+ has a universal value with its human dignity.
Keywords: Human-centric data protection | Human dignity | Japanese data protection laws | Artificial intelligence | Convention 108+
مقاله انگلیسی
10 Dead ringers? Legal persons and the deceased in European data protection law
زنگ های مرده؟ اشخاص حقوقی و متوفی در قانون حفاظت از داده های اروپا-2020
Notwithstanding suggestions that the concrete treatment of legal and deceased person data during European data protection’s development has been broadly comparable, this article finds that stark divergences are in fact apparent. Justification for the inclusion of both categories has rested on a claimed linkage to living natural person interests. However, despite early fusion, legal persons have been increasingly seen to have qualitatively different information entitlements compared to natural persons, thereby leaving European data protection with a very limited and indirect role here. In contrast, living natural persons and the deceased have not been conceived as normatively dichotomous and since the 1990s there has been growing interest both in establishing sui generis direct protection for deceased person data and also indirect inclusion through a link with living natural persons. Whilst the case for some indirect inclusion is overwhelming, a broad approach to the inter-relational nature of data risks further destabilizing the personal data concept even in relation to living persons alone. Given that jurisdictions representing almost half of the EEA’s population now provide some direct protection and the challenges of managing digital data on death continue to grow, the time may be ripe for a ‘soft’ recommendation on direct protection in this area. Drawing on existing law and scholarship, such a recommendation could seek to specify the role of both specific control rights and diffuse confidentiality obligations, the criteria for time-limits in each case and the need for a balance with other rights and interests which recognises the significantly decreasing interest in protection over time.
Keywords: Companies | Confidentiality | Personal data | Privacy | Testamentary interests | Reputation
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 12031 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 12031 :::::::: افراد آنلاین: 64