• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 48
  • 9
  • 6
  • 5
  • 5
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 90
  • 90
  • 21
  • 13
  • 10
  • 10
  • 10
  • 10
  • 10
  • 9
  • 9
  • 7
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Anonymita v P2P sítích / Anonymity in P2P Networks

Brunai, Adam January 2014 (has links)
Freedom of speech and the right to privacy are maybe the most important elements of a modern society, yet the rights are often violated. This fact was the main reason for writing this thesis covering P2P network models, anonymity, censorship resistance and their use in real P2P networks and publishing systems. We discuss their effectiveness and suitability for specific purposes, but also the security considerations of their use. The second part of this thesis presents the LSPP publishing protocol, which is an library implementation of an anonymous censorship resistant P2P network. Finally, we analyze the proposed protocol and compare it with existing solutions.
72

A Semantic Data Model to Represent Building Material Data in AEC Collaborative Workflows

Valluru, Prathap, Karlapudi, Janakiram 27 January 2021 (has links)
The specification of building material is required in multiple phases of engineering and construction projects towards holistic BIM implementations. Building material information plays a vital role in design decisions by enabling different simulation processes, such as energy, acoustic, lighting, etc. Utilization and sharing of building material information between stakeholders are some of the major influencing factors on the practical implementation of the BIM process. Different meta-data schemas (e.g. IFC) are usually available to represent and share material information amongst partners involved in a construction project. However, these schemas have their own constraints to enable efficient data sharing amongst stakeholders. This paper explains these constraints and proposes a methodological approach for the representation of material data using semantic web concepts aiming to support the sharing of BIM data and interoperability enhancements in collaboration workflows. As a result, the DICBM (https://w3id.org/digitalconstruction/BuildingMaterials) ontology was developed which improves the management of building material information in the BIM-based collaboration process.:Abstract 1. Introduction and Background 1.1 Building Information Modeling for collaboration 1.2 Information management in AEC using semantic web technologies 2 DICBM: Digital Construction Building Material Ontology 2.1 Building Material Data in IFC 2.2 Overview of the building material ontology 2.3 Integration of external ontology concepts and roles 2.4 Material Definition 2.5 Material, Material Type, and Material Property 2.6 Data Properties in DICBM 3 Conclusions Acknowledgments References
73

Health data sharing and privacy among older people using smartwatches

Apelthun, Henrietta January 2022 (has links)
Smartwatches can collect health data, location data and other sensitive information about users, and privacy concerns arise. This thesis aimed to investigate how older people (50-80 years old) in Sweden behave when it comes to privacy and health data. The data were analyzed according to the privacy paradox, which describes the discrepancy between how people behave and how they intend to behave in relation to risk and trust. The research approach was qualitative, and twelve semi-structured interviews were conducted. The interviews were coded and thematized following the chosen theory. Among the twelve participants in the study, a majority did not see, understand, or behave consciously towards the risks of sharing health data. Instead, trust was related to both the disclosure behavior and the intentional behavior among several of the participants in this study. This study indicates that for some of the participants, there are also other factors that determine their behavior, and the privacy paradox alone is not complete. Four of the findings when it comes to participants' behavior towards their health data and privacy were: trust-based decisions, lack of knowledge, low value of personal data, and value benefits more than privacy. Among several of the participants in this study, when trust towards an actor increase, the participant’s risk awareness decreases. It can be discussed whether the participants in the study value the opportunities more than the risks, and this impacts their behavior. Most of the participants think that sharing location data infringes more on their privacy than sharing health data, and self-education might be a reason the behavior and the level of privacy differ among the participants.
74

A methodology to determine and classify data sharing requirements between OpenBIM models and energy simulation models

Karlapudi, Janakiram 29 January 2021 (has links)
Energy analysis at different stages of a building’s life-cycle allows designers and engineers to make proper design decisions, which will enhance the efficiency and energy saving measures. However, energy analysis of a building using traditional methods at every stage of the project is time-consuming and more labor intensive. Thus, energy simulations of buildings are rarely introduced in all design stages of the project. This study focuses on data transfer process from BIM model (Revit) to energy simulation model (IES ‹VE›) using OpenBIM meta-data model - Industry Foundation Classes (IFC) as an exchangeable file format. This data sharing process simplifies the complexity in energy modeling and allows to investigate different design alternatives in each phase of the building’s life-cycle. To investigate the efficiency and completeness of this data transfer process, a demonstration of data sharing is carried. By evaluating the results from the demonstration, efficiency gaps are identified in the data transferred process. A detailed investigation on the cause of efficiency gaps in data sharing is carried out and incorporated in this paper.:Abstract 1. Introduction 2. Building Energy Simulation 2.1. Categorization of Energy Simulation Models 3. Data Sharing Requirements - IFC 4. Data Sharing Demonstration 4.1. BIM model 4.2. Data investigation with model viewer 4.3. Data quality verification in energy simulation model 4.3.1. Evaluation of Results 5. Conclusion References
75

Scientists' perception on institutional data sharing support and pressure : Investigating ecologists’ data sharing behavior / Forskarnas uppfattning om institutionella stöd och påtryckningar kring datadelning : Undersökning av ekologers beteende kring datadelning

Glashoff, Jenny January 2023 (has links)
Data from underlying research has become increasingly important to scientists and the public in recent decades. As a result, funders and journal publishers have become increasingly demanding that scientists share their data. Universities have also been encouraged to advance their data sharing support units as a result of this development. Earlier studies on data sharing among scientists have primarily explored the barriers to data sharing, while motivations and perceptions among scientists that have shared their data have been examined less. To this end, this thesis investigates perceptions and responsibilities on data sharing among ecologists that have shared data in an open data repository within the last 12 months. As a public-funded and university-supported repository, the Swedish National Data Service (SND) is selected for this purpose. Semi-structured interviews with six ecologists are conducted to evaluate their motivations and perceived responsibilities on data sharing, The theory of planned behavior (TBP) serves as theoretical framework. Earlier TPB models are adapted to include new factors that potentially influence data sharing behavior among ecologists. The interviews highlight several individual and institutional factors that influence ecologists' data sharing in the SND repository. On the individual level, the informants perceive a strong personal responsibility to share their data publicly. On the institutional level, they perceive that journals have a large responsibility, and the findings indicate that journal pressure, in isolation, has a positive impact on data sharing. Perceptions about the SND support are ambiguous among the informants. While generally perceived as helpful and quality enhancing, most informants found it stressful and time consuming to share their data via the SND support. Thus, the combination of journal pressure and perceived stress associated with preparing data for SND has a negative influence on the motivation to share the data in the repository. Unless data sharing in SND is facilitated, or the pressure from journals is mitigated, scientists might increasingly opt for using repositories that require less strict metadata descriptions. / Data från underliggande forskning har blivit allt viktigare för forskare och allmänheten under de senaste decennierna. Såväl forskningsfinansiärer som utgivare av vetenskapliga tidskrifter har ställt allt högre krav på att forskare ska dela sina data. Universiteten har också uppmuntrats att utveckla sina stödenheter för datadelning. Tidigare studier om datadelning bland forskare har i första hand undersökt hinder för forskare från att dela sina data, medan uppfattningar bland forskare som har delat sina data inte har undersökts i lika stor utsträckning. Denna avhandling undersöker uppfattningar och ansvar för datadelning bland ekologer som har delat data i ett öppet dataarkiv under de senaste 12 månaderna. Dataarkivet vid Svensk Nationell Datatjänst (SND) väljs för detta ändamål eftersom det stöds av flera universitet och är offentligt finansierad. Semistrukturerade intervjuer genomförs med sex ekologer för att utvärdera drivkrafter och upplevda ansvar kring datadelning. Teorin om planerat beteende (TBP) används som teoretiskt ramverk. Tidigare TPB-modeller anpassas för att inkludera nya faktorer som kan påverka datadelningsbeteendet hos ekologer. Intervjuerna belyser flera individuella och institutionella faktorer som påverkar ekologernas datadelning i SND. På individnivå upplever informanterna ett personligt ansvar att dela sin data offentligt. På institutionell nivå anser de att tidskrifter har stort ansvar och resultaten tyder på att påtryckningar från tidskrifter har en positiv inverkan på datadelning. Uppfattningar om SND-supporten är tvetydiga. Många upplevde stödet hjälpsamt och kvalitetshöjande, men också att det var stressigt och tidskrävande att dela sina data via SND-supporten. Således har kombinationen av påtryckningar från tidskrifter och upplevd stress i samband med förberedelse av data för SND en negativ inverkan på datadelning i arkivet. Såvida inte datadelningen i SND underlättas, eller påtryckningarna från tidskrifter mildras, kan forskare i allt högre grad välja att använda arkiv som kräver mindre strikta metadatabeskrivningar.
76

Data sharing in the transformation to electromobility : Challenges and opportunities for the transportation industry / Datadelning inom elektromobilitets transformationen : Utmaningar och möjligheter för transportindustrin

Flach, Diana, Österberg, Petra January 2022 (has links)
The transport industry is facing major changes in the transition from traditional diesel-powered vehicles to electrified vehicles. The transition to electric vehicles in the transport industry is necessary to reach the environmental goals of the Paris Agreement. Through research, data sharing between actors was identified as a potential factor that could be used in the development of the electromobility sector, but sufficient information on this subject was lacking. This led to the basis for the thesis project. The thesis project was carried out in collaboration with Volvo Group, hereby interchangeably called Volvo, to investigate how data sharing can be used to facilitate the transformation to electromobility in the transport industry. The purpose of the thesis was to: Investigate how Volvos Value Offering can be improved by mapping out potential actors in the electromobility eco-system and how they could benefit from shared data. The thesis was based on the three research questions: What values and offers can be created in the charging infrastructure industry through shared data and what challenges, risks and opportunities do this create for the stakeholders involved? What information gaps hinder the development of the electromobility market, in general and, more specifically, in relation to data sharing? And lastly, how can Volvo take advantage of business opportunities in the electromobility market, in general and, more specifically, in relation to data sharing? The methods used to answer these questions were media analysis, 19 in-depth interviews, and a workshop with Volvo. The media analysis resulted in a mapping of the involved stakeholders in the electromobility development industry, how data sharing is used today and the actors' stance on data sharing. The interviews were held with respondents from the energy industry, tech companies, researchers, haulage companies and the truck manufacturer Volvo Group. The interviews were organized using the Gioia method and resulted in six different global themes on electromobility and data sharing. Results from the media analysis and the interviews were compiled into three scenarios. These were then presented to Volvo in a workshop, where they described how they would act as a major truck manufacturer in each scenario respectively. After compiling the results from the three methods, the research questions could be answered. The first research question was answered by the fact that the transport industry has a low degree of data maturity. The reason being that there are several perceived risks among the actors regarding data sharing in the form of losing competitive advantages, increased risks of cyber-attacks and GDPR violations. Despite the low degree of data maturity, there were also new opportunities that could be identified with data sharing. The biggest identified opportunity in this thesis was that data sharing can accelerate the development and expansion of the charging infrastructure, if vehicle data and energy data can be shared between actors. The second research question was answered simply by the fact that due to the low data degree of maturity, very little data is shared at present. The biggest identified information gap was the “chicken and egg” situation in the industry, where energy actors are waiting for initiatives from the automotive industry before making any decisions, and vice versa. The third research question was answered by identifying that Volvo's greatest opportunities as truck manufacturers exist through collaborations with other companies to establish standards for data sharing and data selling, offering charging solutions for their electric trucks and, finally, logistics optimization services based on real-time data. As the three research questions were answered, the purpose of the study was therefore fulfilled. The initial scope of the thesis was expanded from focusing solely on Volvo's opportunities as a truck manufacturer, to include opportunities for actors in the entire electromobility industry such as energy companies, charging post companies, haulage companies and tech companies. The study concluded by showing that there are great potential business and optimization opportunities and societal benefits with data sharing in the EMOB industry if the actors are willing to collaborate to set standards and drive development together. / Transportindustrin står inför stora förändringar i omställningen från traditionella dieseldrivna fordon till elektrifierade fordon. Omställningen inom transportindustrin är nödvändig för att nå miljömålen inom Parisavtalet. Forskning visar att datadelning mellan aktörer är en potentiell faktor som skulle kunna användas inom utvecklingen av elektromobilitetssektorn, men tillräckligt med information om detta område saknas. Detta blev grunden för examensarbetet. Examensarbetet genomfördes i samarbete med Volvo Group, hädan efter kallat Volvo, för att undersöka hur datadelning kan användas för att underlätta elektromobilitetsomvandlingen inom transportbranschen. Syftet med arbetet var att: Undersöka hur Volvos värdeerbjudanden kan förbättras genom att kartlägga potentiella aktörer i ekosystemet för elektromobilitet och hur de kan dra nytta av delade data. Arbetet utgick ifrån de tre forskningsfrågorna: Vilka värden och erbjudanden kan skapas inom laddinfrastruktur branschen genom delade data, vilka utmaningar, risker och möjligheter skapar detta för de inblandade intressenterna? Vilka informationsluckor hindrar utvecklingen av elektromobilitetsmarknaden, generellt och, mer specifikt, i relation till datadelning? Och slutligen, hur kan Volvo ta vara på affärsmöjligheter inom elektromobilitetsmarknaden, generellt och, mer specifikt, i relation till datadelning? Metoderna som användes för att besvara dessa frågor var mediaanalys, 19 djupintervjuer, samt en workshop med Volvo Group. Mediaanalysen resulterade i en kartläggning av drivande aktörer inom elektromobilitetsbranschen, hur datadelning används i dagsläget och aktörernas inställning till datadelning. Intervjuerna hölls med respondenter från energibranschen, techbolag, forskare, åkerier och Volvo Group. Intervjuerna organiserades med Gioia metoden och resulterade i sex olika globala teman om elektromobilitet och datadelning. Resultat från mediaanalysen och intervjuerna sammanställdes i tre scenarion. Dessa presenterades för Volvo i en workshop där de fick resonera hur de skulle agera som en stor lastbilstillverkare i respektive scenario. Efter sammanställning av resultaten från de tre metoderna kunde forskningsfrågorna besvaras. Den första forskningsfrågan besvarades med att transportbranschen i sig har låg datamognadsgrad. Det eftersom det fanns flera uppfattade risker hos aktörerna kring datadelning i form av förlorade konkurrensfördelar, ökade risker för cyberattacker och GDPR överträdelser. Trots den låga datamognadsgraden så finns det nya möjligheter med datadelning, där den största identifierade möjligheten i detta arbete är att datadelning kan påskynda utvecklingen och utbyggnaden av laddinfrastrukturen om fordonsdata och energidata kan delas mellan aktörer. Den andra forskningsfrågan besvarades med att på grund av den låg data mognadsgraden så delas väldigt lite data i dagsläget. Det största identifierade informationsluckan var “hönan eller ägget” situationen i branschen, där energiaktörer väntar på initiativ från fordonsbranschen innan de tar några beslut, och vice versa. Den tredje forskningsfrågan besvarades med att Volvos största möjligheter som lastbilstillverkare finns genom samarbeten med andra företag för att etablera standarder för datadelning och dataförsäljning, erbjuda laddlösningar till sina elektriska fordon och slutligen logistikoptimeringstjänster baserade på realtidsdata. I och med att de tre forskningsfrågorna besvarades, uppfylldes därmed syftet med studien. Omfattningen av arbetet expanderades dock från att enbart fokusera på Volvos möjligheter som lastbilstillverkare, till att omfatta aktörer inom hela elektromobilitets branschen så som energibolag, laddstolpsbolag, åkerier och techbolag. Studien visar att det finns stora potentiella affärs och optimeringsmöjligheter och samhällsnytta med datadelning inom elektromobilitetsbranschen om aktörer är villiga att samarbeta för att sätta standarder och driva utvecklingen tillsammans.
77

Privacy preserving data access mechanism for health data / Sekretessbevarande dataåtkomstmekanism för hälsodata

Abdi Dahir, Najiib, Dahir Ali, Ikran January 2023 (has links)
Due to the rise of digitalization and the growing amount of data, ensuring the integrity and security of patient data has become increasingly vital within the healthcare industry, which has traditionally managed substantial quantities of sensitive patient and personal information. This bachelor's thesis focused on designing and implementing a secure data sharing infrastructure to protect the integrity and confidentiality of patient data. Synthetic data was used to enable access for researchers and students in regulated environments without compromising patient privacy. The project successfully achieved its goals by evaluating different privacy-preserving mechanisms and developing a machine learning-based application to demonstrate the functionality of the secure data sharing infrastructure. Despite some challenges, the chosen algorithms showed promising results in terms of privacy preservation and statistical similarity. Ultimately, the use of synthetic data can promote fair decision-making processes and contribute to secure data sharing practices in the healthcare industry. / Hälso- och sjukvårdsbranschen har länge varit en sektor som hanterar stora mängder känsliga patientdata och personuppgifter. Integriteten och säkerheten hos patientdata har blivit allt viktigare som en följd av ökad datavolym och digitalisering. Detta examensarbete fokuserade på att utforma och implementera en säker datadelning infrastruktur för att skydda integritet och sekretess för patientdata. Syntetisk data användes för att möjliggöra tillgång för forskare och studenter i reglerade miljöer utan att riskera patienters privatliv. Projektet lyckades genom att utvärdera olika integritetsbevarande mekanismer och skapa en maskininlärningsbaserad applikation för att visa den säkra datadelningsinfrastrukturens funktionalitet. Trots vissa utmaningar visade de valda algoritmerna lovande resultat i fråga om integritetsbevarande och statistisk likhet. Slutligen kan användningen av syntetiska data främja rättvisa beslutsprocesser och bidra till säkra datadelningspraxis inom hälso- och sjukvårdsbranschen.
78

Un modèle rétroactif de réconciliation utilité-confidentialité sur les données d’assurance

Rioux, Jonathan 04 1900 (has links)
Le partage des données de façon confidentielle préoccupe un bon nombre d’acteurs, peu importe le domaine. La recherche évolue rapidement, mais le manque de solutions adaptées à la réalité d’une entreprise freine l’adoption de bonnes pratiques d’affaires quant à la protection des renseignements sensibles. Nous proposons dans ce mémoire une solution modulaire, évolutive et complète nommée PEPS, paramétrée pour une utilisation dans le domaine de l’assurance. Nous évaluons le cycle entier d’un partage confidentiel, de la gestion des données à la divulgation, en passant par la gestion des forces externes et l’anonymisation. PEPS se démarque du fait qu’il utilise la contextualisation du problème rencontré et l’information propre au domaine afin de s’ajuster et de maximiser l’utilisation de l’ensemble anonymisé. À cette fin, nous présentons un algorithme d’anonymat fortement contextualisé ainsi que des mesures de performances ajustées aux analyses d’expérience. / Privacy-preserving data sharing is a challenge for almost any enterprise nowadays, no matter their field of expertise. Research is evolving at a rapid pace, but there is still a lack of adapted and adaptable solutions for best business practices regarding the management and sharing of privacy-aware datasets. To this problem, we offer PEPS, a modular, upgradeable and end-to-end system tailored for the need of insurance companies and researchers. We take into account the entire cycle of sharing data: from data management to publication, while negotiating with external forces and policies. Our system distinguishes itself by taking advantage of the domain-specific and problem-specific knowledge to tailor itself to the situation and increase the utility of the resulting dataset. To this end, we also present a strongly contextualised privacy algorithm and adapted utility measures to evaluate the performance of a successful disclosure of experience analysis.
79

公務機關之間傳輸個人資料保護規範之研究-以我國、美國及英國法為中心 / A Comparative Study of Regulations for the Protection of Personal Data Transmitted between Government Agencies in Taiwan, the U.S. and the U.K.

林美婉, Lin, Mei Wan Unknown Date (has links)
政府利用公權力掌握之個人資訊包羅萬象,舉凡姓名、生日、身分證字號、家庭、教育、職業等。科技進步與網際網路發達,使原本散置各處之資料,可以迅速連結、複製、處理、利用;而為了增加行政效率與減少成本,機關透過網路提供公眾服務日益頻繁,藉由傳輸共用個人資料等情況已漸成常態。這些改變雖然對政府與民眾帶來利益,但是也伴隨許多挑戰,尤其當數機關必須共用資訊時,將使管理風險更添複雜與難度,一旦過程未加妥善管制,遭人竊取、竄改、滅失或洩露,不僅當事人隱私受損,也嚴重傷害政府威信。因此,凡持有個人資料的政府機關,均必須建立適當行政、技術與實體防護措施,以確保資料安全與隱密,避免任何可能危及資料真實之威脅與機會,而造成個人人格與公平之侵害。   隨著全球經濟相互連結以及網路普及,個人資料保護如今已是國際事務,這個趨勢顯現在愈來愈多的國家法律與跨國條款如OECD、歐盟、APEC等國際組織規範。而在先進國家中,美國與英國關於資訊隱私法制發展有其不同歷史背景,目前美國聯邦機關持有使用個人資料必須遵循的主要法規為隱私法、電腦比對與隱私保護法、電子化政府法、聯邦資訊安全管理法,以及預算管理局發布的相關指導方針;英國政府則必須遵守人權法與歐盟指令架構所制定的資料保護法,並且受獨立資訊官監督審核。此外,為了增加效率,減少錯誤、詐欺及降低個別系統維護成本,公務機關之間或不同層級政府所持有之個人資料流用有其必要性,故二國在資料傳輸實務上亦有特殊規定或作業規則。相較之下,我國2012年10月1日始施行的「個人資料保護法」對於公部門間傳輸個人資料之情形並無具體規定,機關內外監督機制亦付之闕如,使個人資料遭不當使用與揭露之風險提高。 為了保障個人資訊隱私權,同時使公務機關之間傳輸利用個人資訊得以增進公共服務而不違反當事人權益,本研究建議立法或決策者可參酌美國與英國法制經驗,明定法務部負責研擬詳細實施規則與程序以供各機關傳輸個人資料之遵循,減少機關資訊流用莫衷一是的情況;而為保證個人資訊受到適當保護,除了事先獲得當事人同意外,機關進行資料共用之前,應由專業小組審核,至於考慮採取的相關重要措施尚有:(1)建置由政策、程序、人力與設備資源所組成之個人資訊管理系統(PIMS),並使成為整體資訊管理基礎設施的一部分;(2)指派高階官員負責施行及維護安全控制事項;(3)教育訓練人員增加風險意識,塑造良好組織文化;(4)諮詢利害關係人,界定共用資料範圍、目的與法律依據;(5)實施隱私衝擊評估(PIA),指出對個人隱私的潛在威脅並分析風險減緩替代方案;(6)簽定正式書面契約,詳述相關權利與義務;(7)執行內外稽核,監督法規遵循情況,提升機關決策透明、誠信與責任。 關鍵詞:個人資料保護、隱私權、資訊隱私、資料傳輸、資料共用 / Governments have the power to hold a variety of personal information about individuals, such as the name, date of birth, I.D. Card number, family, education, and occupation. Due to advanced technology and the use of the Internet, personal data stored in different places can be connected, copied, processed, and used immediately. It is relatively common for government agencies to provide people with services online as well as transmit or share individual information to improve efficiency and reduce bureaucratic costs. These changes clearly deliver great benefits for governments and for the public, but they also bring new challenges. Specifically, managing risks around sharing information can sometimes become complicated and difficult when more than one agency is involved. If the government agency which keeps personal information cannot prevent it from being stolen, altered, damaged, destroyed or disclosed, it can seriously erode personal privacy and people’s trust in the government. Therefore, each agency that maintains personal data should establish appropriate administrative, technical, and physical safeguards to insure the security and confidentiality of data and to protect against any anticipated threats or hazards to the integrity which could result in substantial harm on personality and fairness to any individual . As the global economy has become more interconnected and the Internet ubiquitous, personal data protection is by now a truly international matter. The trend is fully demonstrated by the growing number of national laws, supranational provisions, and international regulations, such as the OECD, the EU or the APEC rules. Among those developed countries, both the U.S. and the U.K. have their historical contexts of developing legal framework for information privacy. The U.S. Federal agency use of personal information is governed primarily by the Privacy Act of 1974, the Computer Matching and Privacy Protection Act of 1988, the E-Government Act of 2002 , the Federal Information Security Management Act of 2002, and related guidance periodically issued by OMB. The U.K. government has to comply with the Human Rights Act and the Data Protection Act of 1998 which implemented Directive 95/46/EC. Its use of individual data is overseen and audited by the independent Information Commissioner. Further, because interagency data sharing is necessary to make government more efficient by reducing the error, fraud, and costs associated with maintaining a segregated system, both countries have made specific rules or code of practice for handling the transmission of information among different agencies and levels of government. By contrast, Taiwan Personal Information Protection Act of 2010 which finally came into force on 1 October 2012 contains no detailed and clear provisions for data transmitted between government agencies. Moreover, there are also no internal or external oversight of data sharing practices in the public sector. These problems will increase the risk of inappropriate use and disclosure of personal data. To protect individual information privacy rights and ensure that government agencies can enhance public services by data sharing without unreasonably impinging on data subjects’ interests, I recommend that law makers draw on legal experiences of the U.S. and the U.K., and specify that the Ministry of Justice has a statutory duty to prescribe detailed regulations and procedures for interagency data transmission. This could remove the fog of confusion about the circumstances in which personal information may be shared. Also, besides obtaining the prior consent of the data subject and conducting auditing by a professional task force before implementing interagency data sharing program, some important measures as follows should be taken: (1) Establish a Personal Information Management System which is composed of the policies, procedures, human, and machine resources to make it as part of an overall information management infrastructure; (2) Appoint accountable senior officials to undertake and maintain the implementation of security controls; (3) Educate and train personnel to raise risk awareness and create a good organizational culture; (4) Consult interested parties and define the scope, objective, and legal basis for data sharing; (5) Conduct privacy impact assessments to identify potential threats to individual privacy and analyze risk mitigation alternatives; (6) Establish a formal written agreement to clarify mutual rights and obligations; (7) Enforce internal as well as external auditing to monitor their compliance with data protection regulations and promote transparency, integrity and accountability of agency decisions. Key Words: personal data protection, privacy rights, information privacy, data transmission, data sharing
80

Checking Compatability of Programs on Shared Data

Pranavadatta, DN January 2011 (has links) (PDF)
A large software system is built by composing multiple programs, possibly developed independently. The component programs communicate by sharing data. Data sharing involves creation of instances of the shared data by one program, called the producer, and its interpretation by another program, called the consumer. Valid instances of shared data and their correct interpretation is usually specified by a protocol or a standard that governs the communication. If a consumer misinterprets or does not handle some instances of data produced by a producer, it is called as a data compatibility bug. Such bugs manifest as various forms of runtime errors that are difficult to find and fix. In this work, we define various compatibility relations, between both producer-consumer programs and version-related programs, that characterize various subtle requirements for correct sharing of data. We design and implement a static analysis to infer types and guards over elements of shared data and the results are used for automatic compatibility checking. As case studies, we consider two widely used shared data-the TIFF structure, used to store TIFF directory attributes in memory, and IEEE 802. 11 MAC frame header which forms the layer 2 header in Wireless LAN communication. We analyze and check compatibility of 6 pairs of producer-consumer programs drawn from the transmit-receive code of Linux WLAN drivers of 3 different vendors. In the setting of version-related programs, we analyze a total of 48 library and utility routines of 2 pairs of TIFF image library (libtiff) versions. We successfully identify 5 known bugs and 1 new bug. For two of known bugs, bug fixes are available and we verify that they resolve the compatibility issues.

Page generated in 0.0786 seconds