نتایج جستجو برای: enhancing values

تعداد نتایج: 601335  

Journal: :The International journal on drug policy 2015
Andrea Petróczi Susan H Backhouse Vassilis Barkoukis Ralf Brand Anne-Marie Elbe Lambros Lazuras Fabio Lucidi

One of the fundamental challenges in anti-doping is identifying athletes who use, or are at risk of using, prohibited performance enhancing substances. The growing trend to employ a forensic approach to doping control aims to integrate information from social sciences (e.g., psychology of doping) into organised intelligence to protect clean sport. Beyond the foreseeable consequences of a positi...

2015
Arnaldo Zelli Fabio Lucidi Luca Mallia

This contribution attempts to provide a broad perspective to the psychological study of neuroenhancement (NE). It departs from the assumption that, as the use of performance enhancing substances in sport, the use of substances with the aim of improving one's cognitive, motivational and affective functioning in academic domains is a goal-directed behavior. As such, its scientific study may very ...

2005
Craig Pearce Peter Bertók Ron G. van Schyndel

The increasing number of linkable vendor-operated databases present unique threats to customer privacy and security intrusions, as personal information communicated in online transactions can be misused by the vendor. Existing privacy enhancing technologies fail in the event of a vendor operating against their stated privacy policy, leading to loss of customer privacy and security. Anonymity ma...

2014
Prima Gustiene Remigijus Gustas

A fundamental privacy principle, which is enforced in many privacy-enhancing technologies, is data minimization, i.e. the amount of personal data that are revealed to others and extend to which they are processed should be minimized. Privacy-enhancing identity management is important for processing personal data, the purpose of which is to protect personal data. This is especially relevant for ...

Journal: :New Media & Society 2004
David J. Phillips

Privacy” is an ambiguous notion, encompassing personal autonomy, democratic participation, identity management, and social coordination. Each of these privacy ideals reflect different sets of social concerns. Laws operationalize privacy in terms of “personally identifiable information.” Technologies reify that definition. This has implications for the constitution of identity and social life. I...

2009
Pravir Chawdhry Ioannis Vakalis

Digital identity management (IdM) for citizen-life processes requires trusted relationship among the service providers and users. Current IdM systems tend to lack the trust component in particular for online transactions. We propose the use of ePassport as a globally interoperable trust token to bridge the gap between offline and online environments. The paper analyses trust attributes of the e...

Journal: :CoRR 2001
David J. Phillips

As privacy issues have gained social salience, entrepreneurs have begun to offer privacy enhancing technologies (PETs) and the U.S. has begun to enact privacy legislation. But"privacy"is an ambiguous notion. In the liberal tradition, it is an individualistic value protecting citizens from intrusion into a realm of autonomy. A feminist critique suggests that the social utility of privacy is to e...

Journal: :IEICE Transactions 2013
Tatsuya Kon Takashi Obi Hideaki Tashima Nagaaki Ohyama

Parametric images can help investigate disease mechanisms and vital functions. To estimate parametric images, it is necessary to obtain the tissue time activity curves (tTACs), which express temporal changes of tracer activity in human tissue. In general, the tTACs are calculated from each voxel’s value of the time sequential PET images estimated from dynamic PET data. Recently, spatio-temporal...

2013
Antonio Orlacchio Anna Micaela Ciarrapico Orazio Schillaci Manlio Guazzaroni Tommaso Volpi Roberta Danieli Giovanni Simonetti

Objectives: To analyze the whole PET/CT imaging protocol from patient’s registration to the end of the exam in order to optimize the use of such device. Methods: Data from June to July 2010 and from September to October 2010 were acquired, evaluating the time required by every step of the patient pathway. After the first data acquisition, we identified critical elements connected with the execu...

Journal: :Computer Standards & Interfaces 2003
Vanja Senicar Borka Jerman-Blazic Tomaz Klobucar

In this paper, we discuss privacy threats on the Internet and possible solutions to this problem. Examples of privacy threats in the communication networks are identity disclosure, linking data traffic with identity, location disclosure in connection with data content transfer, user profile disclosure or data disclosure itself. Identifying the threats and the technology that may be used for pro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید