The Politics of Privacy: Planning for Personal Data Systems as Powerful Technologies. By James Rule, Douglas McAdam, Linda Stearns, and David Uglow. (New York: Elsevier, 1980. Pp. xii + 212. $14.95.)

1981 ◽  
Vol 75 (2) ◽  
pp. 511-512
Author(s):  
David M. O'brien
Keyword(s):  
New York ◽  
Author(s):  
José Moura ◽  
Carlos Serrão

This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.


2021 ◽  
Vol 2 (4) ◽  
pp. 01-03
Author(s):  
Arslan Gürcan

Dyspnea is one of the reasons why many heart failure patients present to the emergency department. A 75 year-old female presented to a cardiologist with prominent dyspnea and orthopnea. Her heart failure was diagnosed by doctors as New York Heart Association (NYHA) Class III. Progressive increase in episodic shortness of breath forthe past 3 weeks. The patient had been in her normal state of health until 3 weeks ago that she had difficulty catching her breath while walking.The patient got 7 points from the first Borg Dyspnea Scale. The study is a case-report study. Personal Data Form (PDF), Borg Clinical Rating for Dyspnea (Borg CR-10) was evaluated by researcher. Classic foot massage was applied to each foot for a total of 30 minutes, up to 15 minutes, once a day for seven days. Dyspnea was measured after the massage following 10 min of resting. Foot massage was applied by the researcher. Distribution of dyspnea level first and seventh is given in Table 1. Dyspnea level of the patient intervention foot massage decreased to 5.00 from 7.00 at the end of seventh session. Foot massage which is an easy and safe method may be preferably used as a supportive treatment for elevated dyspnea. However, more studies are needed to examine the effect of foot massage on dyspnea level in heart failure patients.


1983 ◽  
Vol 12 (1) ◽  
pp. 88
Author(s):  
Richard W. Wilsnack ◽  
James Rule ◽  
Douglas McAdam ◽  
Linda Stearns ◽  
David Uglow
Keyword(s):  

2018 ◽  
Vol 31 (31) ◽  
pp. 169-186
Author(s):  
Marek Mazur

The EU GDPR Regulation introduced rules and regulations on the protection of individuals with regard to the processing of their personal data regardless of their citizenship or place of residence. The article focuses on issues related directly to the regulation on the protection of personal data and related to documents that regulate the protection of personal data and their processing in public institutions in Poland. The author presents basic estimates about the entry of the GDPR Regulation, indicates the importance of individual Dobies/organisations and entities playing a key role in the protection of personal data on the territory of Poland. It describes the documents that establish minimum standards for personal data protection systems to be developed in public institutions to guarantee security. In this article, the author attempted to indicate the scope and nature of changes in personal data systems in the light of the provisions of the GDPR Regulation.


Data & Policy ◽  
2020 ◽  
Vol 2 ◽  
Author(s):  
Ina Sander

Abstract Datafied societies need informed public debate about the implications of data science technologies. At present, internet users are often unaware of the potential consequences of disclosing personal data online and few citizens have the knowledge to participate in such debates. This paper argues that critical big data literacy efforts are one way to address this lack of knowledge. It draws on findings from a small qualitative investigation and discusses the effectiveness of online critical big data literacy tools. Through pre and post use testing, the short- and longer-term influence of these tools on people’s privacy attitudes and behavior was investigated. The study’s findings suggested that the tools tested had a predominantly positive initial effect, leading to improved critical big data literacy among most participants, which resulted in more privacy-sensitive attitudes and internet usage. When analyzing the tools’ longer-term influence, results were more mixed, with evidence suggesting for some that literacy effects of the tools were short-lived, while for others they led to more persistent and growing literacy. The findings confirm previous research noting the complexity of privacy attitudes and also find that resignation toward privacy is multi-faceted. Overall, this study reaffirms the importance of critical big data literacy and produces new findings about the value of interactive data literacy tools. These tools have been under-researched to date. This research shows that these tools could provide a relevant means to work toward empowering internet users, promoting a critical internet usage and, ideally, enabling more citizens to engage in public debates about changing data systems.


Web Services ◽  
2019 ◽  
pp. 2197-2229
Author(s):  
José Moura ◽  
Carlos Serrão

This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.


Author(s):  
José Moura ◽  
Carlos Serrão

This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.


Sign in / Sign up

Export Citation Format

Share Document