CINXE.COM

Search results for: personal data

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: personal data</title> <meta name="description" content="Search results for: personal data"> <meta name="keywords" content="personal data"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="personal data" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="personal data"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 26429</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: personal data</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26429</span> The Right to Data Portability and Its Influence on the Development of Digital Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Roman%20Bieda">Roman Bieda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The General Data Protection Regulation (GDPR) will come into force on 25 May 2018 which will create a new legal framework for the protection of personal data in the European Union. Article 20 of GDPR introduces a right to data portability. This right allows for data subjects to receive the personal data which they have provided to a data controller, in a structured, commonly used and machine-readable format, and to transmit this data to another data controller. The right to data portability, by facilitating transferring personal data between IT environments (e.g.: applications), will also facilitate changing the provider of services (e.g. changing a bank or a cloud computing service provider). Therefore, it will contribute to the development of competition and the digital market. The aim of this paper is to discuss the right to data portability and its influence on the development of new digital services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20portability" title="data portability">data portability</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20market" title=" digital market"> digital market</a>, <a href="https://publications.waset.org/abstracts/search?q=GDPR" title=" GDPR"> GDPR</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data" title=" personal data"> personal data</a> </p> <a href="https://publications.waset.org/abstracts/77312/the-right-to-data-portability-and-its-influence-on-the-development-of-digital-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/77312.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">473</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26428</span> Strengthening Legal Protection of Personal Data through Technical Protection Regulation in Line with Human Rights</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tomy%20Prihananto">Tomy Prihananto</a>, <a href="https://publications.waset.org/abstracts/search?q=Damar%20Apri%20Sudarmadi"> Damar Apri Sudarmadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Indonesia recognizes the right to privacy as a human right. Indonesia provides legal protection against data management activities because the protection of personal data is a part of human rights. This paper aims to describe the arrangement of data management and data management in Indonesia. This paper is a descriptive research with qualitative approach and collecting data from literature study. Results of this paper are comprehensive arrangement of data that have been set up as a technical requirement of data protection by encryption methods. Arrangements on encryption and protection of personal data are mutually reinforcing arrangements in the protection of personal data. Indonesia has two important and immediately enacted laws that provide protection for the privacy of information that is part of human rights. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Indonesia" title="Indonesia">Indonesia</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data" title=" personal data"> personal data</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a> </p> <a href="https://publications.waset.org/abstracts/93122/strengthening-legal-protection-of-personal-data-through-technical-protection-regulation-in-line-with-human-rights" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">182</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26427</span> Access to Health Data in Medical Records in Indonesia in Terms of Personal Data Protection Principles: The Limitation and Its Implication</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anny%20Retnowati">Anny Retnowati</a>, <a href="https://publications.waset.org/abstracts/search?q=Elisabeth%20Sundari"> Elisabeth Sundari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research aims to elaborate the meaning of personal data protection principles on patient access to health data in medical records in Indonesia and its implications. The method uses normative legal research by examining health law in Indonesia regarding the patient's right to access their health data in medical records. The data will be analysed qualitatively using the interpretation method to elaborate on the limitation of the meaning of personal data protection principles on patients' access to their data in medical records. The results show that patients only have the right to obtain copies of their health data in medical records. There is no right to inspect directly at any time. Indonesian health law limits the principle of patients' right to broad access to their health data in medical records. This restriction has implications for the reduction of personal data protection as part of human rights. This research contribute to show that a limitaion of personal data protection may abuse the human rights. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access" title="access">access</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20data" title=" health data"> health data</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20records" title=" medical records"> medical records</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data" title=" personal data"> personal data</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a> </p> <a href="https://publications.waset.org/abstracts/163628/access-to-health-data-in-medical-records-in-indonesia-in-terms-of-personal-data-protection-principles-the-limitation-and-its-implication" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163628.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26426</span> The Role of Data Protection Officer in Managing Individual Data: Issues and Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nazura%20Abdul%20Manap">Nazura Abdul Manap</a>, <a href="https://publications.waset.org/abstracts/search?q=Siti%20Nur%20Farah%20Atiqah%20Salleh"> Siti Nur Farah Atiqah Salleh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For decades, the misuse of personal data has been a critical issue. Malaysia has accepted responsibility by implementing the Malaysian Personal Data Protection Act 2010 to secure personal data (PDPA 2010). After more than a decade, this legislation is set to be revised by the current PDPA 2023 Amendment Bill to align with the world's key personal data protection regulations, such as the European Union General Data Protection Regulations (GDPR). Among the other suggested adjustments is the Data User's appointment of a Data Protection Officer (DPO) to ensure the commercial entity's compliance with the PDPA 2010 criteria. The change is expected to be enacted in parliament fairly soon; nevertheless, based on the experience of the Personal Data Protection Department (PDPD) in implementing the Act, it is projected that there will be a slew of additional concerns associated with the DPO mandate. Consequently, the goal of this article is to highlight the issues that the DPO will encounter and how the Personal Data Protection Department should respond to this subject. The study result was produced using a qualitative technique based on an examination of the current literature. This research reveals that there are probable obstacles experienced by the DPO, and thus, there should be a definite, clear guideline in place to aid DPO in executing their tasks. It is argued that appointing a DPO is a wise measure in ensuring that the legal data security requirements are met. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=guideline" title="guideline">guideline</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20protection%20officer" title=" data protection officer"> data protection officer</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data" title=" personal data"> personal data</a> </p> <a href="https://publications.waset.org/abstracts/164137/the-role-of-data-protection-officer-in-managing-individual-data-issues-and-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164137.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26425</span> Regulation on the Protection of Personal Data Versus Quality Data Assurance in the Healthcare System Case Report</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Elizabeta%20Krsti%C4%87%20Vukelja">Elizabeta Krstić Vukelja</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digitization of personal data is a consequence of the development of information and communication technologies that create a new work environment with many advantages and challenges, but also potential threats to privacy and personal data protection. Regulation (EU) 2016/679 of the European Parliament and of the Council is becoming a law and obligation that should address the issues of personal data protection and information security. The existence of the Regulation leads to the conclusion that national legislation in the field of virtual environment, protection of the rights of EU citizens and processing of their personal data is insufficiently effective. In the health system, special emphasis is placed on the processing of special categories of personal data, such as health data. The healthcare industry is recognized as a particularly sensitive area in which a large amount of medical data is processed, the digitization of which enables quick access and quick identification of the health insured. The protection of the individual requires quality IT solutions that guarantee the technical protection of personal categories. However, the real problems are the technical and human nature and the spatial limitations of the application of the Regulation. Some conclusions will be drawn by analyzing the implementation of the basic principles of the Regulation on the example of the Croatian health care system and comparing it with similar activities in other EU member states. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=regulation" title="regulation">regulation</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare%20system" title=" healthcare system"> healthcare system</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20dana%20protection" title=" personal dana protection"> personal dana protection</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20data%20assurance" title=" quality data assurance"> quality data assurance</a> </p> <a href="https://publications.waset.org/abstracts/185856/regulation-on-the-protection-of-personal-data-versus-quality-data-assurance-in-the-healthcare-system-case-report" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185856.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">38</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26424</span> Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cai%20Qianyi">Cai Qianyi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=personal%20information%20data%20transmission" title="personal information data transmission">personal information data transmission</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20assessment" title=" risk assessment"> risk assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=DPIA" title=" DPIA"> DPIA</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20service%20provider" title=" internet service provider"> internet service provider</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20information%20data%20transimission" title=" personal information data transimission"> personal information data transimission</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20assessment" title=" risk assessment"> risk assessment</a> </p> <a href="https://publications.waset.org/abstracts/183049/legal-regulation-of-personal-information-data-transmission-risk-assessment-a-case-study-of-the-eus-dpia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183049.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">60</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26423</span> The 1st Personal Pronouns as Evasive Devices in the 2016 Taiwanese Presidential Debate</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yan-Chi%20Chen">Yan-Chi Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aims to investigate the 1st personal pronouns as evasive devices used by presidential candidates in the 2016 Taiwanese Presidential Debate within the framework of critical discourse analysis (CDA). This study finds that the personal pronoun ‘I’ is the highest frequent personal pronoun in the 2016 Taiwanese Presidential Debate. Generally speaking, the first personal pronouns were used most in the presidential debate, compared with the second and the third personal pronouns. Hence, a further quantitative analysis is conducted to explore the correlation between the frequencies of the two 1st personal pronouns and the other pronouns. Results show that the number of the personal pronoun ‘I’ increases from 26 to 49, with the personal pronoun ‘we’ decreases from 43 to 15 during the debate. Though it seems the personal pronoun ‘I’ has a higher tendency in pronominal choice, statistical evidence demonstrated that the personal pronoun ‘we’ has the greater statistical significance (p<0.0002), compared with that of ‘I’ (p<0.0116). The comparatively small p-value of the personal pronoun ‘we’ means it ‘has a stronger correlation with the overall pronominal choice, and the personal pronoun ‘we’ is more likely to be used than the personal pronoun ‘I’. Therefore, this study concludes that the pronominal choice varies with different evasive strategies. The ingrained functions of these personal pronouns are mainly categorized as ‘agreement’ and ‘justification’. The personal pronoun ’we’ is preferred in the agreement evasive strategies, and ‘I’ is used for justifying oneself. In addition, the personal pronoun ‘we’ can be defined as both ‘inclusive’ and ‘exclusive’ personal pronoun, which rendered ‘we’ more functions not limited to agreement evasive strategies. In conclusion, although the personal pronoun ‘I’ has the highest occurrences, the personal pronoun ‘we’ is more related to the first pronoun choices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20discourse%20analysis%20%28CDA%29" title="critical discourse analysis (CDA)">critical discourse analysis (CDA)</a>, <a href="https://publications.waset.org/abstracts/search?q=evasive%20devices" title=" evasive devices"> evasive devices</a>, <a href="https://publications.waset.org/abstracts/search?q=the%201st%20personal%20pronouns" title=" the 1st personal pronouns"> the 1st personal pronouns</a>, <a href="https://publications.waset.org/abstracts/search?q=the%202016%20Taiwanese%20Presidential%20Debate" title=" the 2016 Taiwanese Presidential Debate"> the 2016 Taiwanese Presidential Debate</a> </p> <a href="https://publications.waset.org/abstracts/92847/the-1st-personal-pronouns-as-evasive-devices-in-the-2016-taiwanese-presidential-debate" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92847.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">165</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26422</span> The Impact of Personal Identity on Self-Esteem among Muslim Adolescents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nadia%20Ayub">Nadia Ayub</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of the study was to explore the impact of personal identity on self-esteem among adolescents. Two hypotheses were tested in the study, i.e., personal identity effects on self-esteem; and gender difference in the variables of personal identity and self-esteem. The total of 300 (150 female; 150 male) adolescents participated in the study. Personal identity scale (Ayub, N., In Press), and self-esteem scale (Rosenberg, 1985) were administered. The findings of the study suggest that positive personal identity impact on self-esteem and gender difference was found on the variables of personal identity and self-esteem. In conclusion, the results of the study are beneficial for researchers, policymakers, psychologists. The strong positive personal identity and self-esteem help in healthy mental development not only in adolescence but throughout the life of individuals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=personal%20identity" title="personal identity">personal identity</a>, <a href="https://publications.waset.org/abstracts/search?q=self-esteem" title=" self-esteem"> self-esteem</a>, <a href="https://publications.waset.org/abstracts/search?q=adolescents" title=" adolescents"> adolescents</a>, <a href="https://publications.waset.org/abstracts/search?q=positive%20psychology" title=" positive psychology"> positive psychology</a> </p> <a href="https://publications.waset.org/abstracts/103746/the-impact-of-personal-identity-on-self-esteem-among-muslim-adolescents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/103746.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">401</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26421</span> Organisational Disclosure: Threats to Individuals&#039; Privacy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20A.%20Badrul">N. A. Badrul </a> </p> <p class="card-text"><strong>Abstract:</strong></p> People are concerned that they are vulnerable as a result of what is exposed about them on the internet. Users are increasingly aware of their privacy and are making various efforts to protect their personal information. However, besides individuals themselves, organisations are also exposing personal information of their staff to the general public by publishing it on their official website. This practice may put individuals at risk and particularly vulnerable to threats. This preliminary study explores explicitly the amount and types of personal information disclosure from organisational websites. Threats and risks related to the disclosures are discussed. In general, all the examined organisational websites discloses personal information with varies identifiable degree of data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=personal%20information" title="personal information">personal information</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=e-government" title=" e-government"> e-government</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20disclosure" title=" information disclosure"> information disclosure</a> </p> <a href="https://publications.waset.org/abstracts/8541/organisational-disclosure-threats-to-individuals-privacy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8541.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">318</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26420</span> Exploring the Intersection Between the General Data Protection Regulation and the Artificial Intelligence Act</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maria%20J%C4%99drzejczak">Maria Jędrzejczak</a>, <a href="https://publications.waset.org/abstracts/search?q=Patryk%20Pieni%C4%85%C5%BCek"> Patryk Pieniążek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The European legal reality is on the eve of significant change. In European Union law, there is talk of a “fourth industrial revolution”, which is driven by massive data resources linked to powerful algorithms and powerful computing capacity. The above is closely linked to technological developments in the area of artificial intelligence, which has prompted an analysis covering both the legal environment as well as the economic and social impact, also from an ethical perspective. The discussion on the regulation of artificial intelligence is one of the most serious yet widely held at both European Union and Member State level. The literature expects legal solutions to guarantee security for fundamental rights, including privacy, in artificial intelligence systems. There is no doubt that personal data have been increasingly processed in recent years. It would be impossible for artificial intelligence to function without processing large amounts of data (both personal and non-personal). The main driving force behind the current development of artificial intelligence is advances in computing, but also the increasing availability of data. High-quality data are crucial to the effectiveness of many artificial intelligence systems, particularly when using techniques involving model training. The use of computers and artificial intelligence technology allows for an increase in the speed and efficiency of the actions taken, but also creates security risks for the data processed of an unprecedented magnitude. The proposed regulation in the field of artificial intelligence requires analysis in terms of its impact on the regulation on personal data protection. It is necessary to determine what the mutual relationship between these regulations is and what areas are particularly important in the personal data protection regulation for processing personal data in artificial intelligence systems. The adopted axis of considerations is a preliminary assessment of two issues: 1) what principles of data protection should be applied in particular during processing personal data in artificial intelligence systems, 2) what regulation on liability for personal data breaches is in such systems. The need to change the regulations regarding the rights and obligations of data subjects and entities processing personal data cannot be excluded. It is possible that changes will be required in the provisions regarding the assignment of liability for a breach of personal data protection processed in artificial intelligence systems. The research process in this case concerns the identification of areas in the field of personal data protection that are particularly important (and may require re-regulation) due to the introduction of the proposed legal regulation regarding artificial intelligence. The main question that the authors want to answer is how the European Union regulation against data protection breaches in artificial intelligence systems is shaping up. The answer to this question will include examples to illustrate the practical implications of these legal regulations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20protection%20law" title="data protection law">data protection law</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data" title=" personal data"> personal data</a>, <a href="https://publications.waset.org/abstracts/search?q=AI%20law" title=" AI law"> AI law</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data%20breach" title=" personal data breach"> personal data breach</a> </p> <a href="https://publications.waset.org/abstracts/185310/exploring-the-intersection-between-the-general-data-protection-regulation-and-the-artificial-intelligence-act" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185310.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">65</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26419</span> The Effects of Ethnicity, Personality and Religiosity on Desire for Personal Space</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ioanna%20Skoura">Ioanna Skoura</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Past research shows that personal space has been investigated since the 1950s. Also, personality traits have been found to have a significant relationship with personal space. However, some of these studies have been criticized for being ethically inappropriate. In an attempt to avoid ethical issues, a new scale measuring desire for personal space has been created. The purpose of the present study is to investigate the impact of ethnicity on desire for personal space. Additionally, extraversion and neuroticism are expected to predict significantly desire for personal space. Furthermore, the study is looking for any impact of religiosity on desire for personal space. In order to test the previous hypotheses, 115 participants from three cultural groups (English, Greeks in Greece and Greeks in the UK) are recruited online. Results indicate that only extraversion and religiosity are significant predictors of desire for personal space. Implications of the findings are discussed and suggestions for future research are made. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethnicity" title="ethnicity">ethnicity</a>, <a href="https://publications.waset.org/abstracts/search?q=religiosity" title=" religiosity"> religiosity</a>, <a href="https://publications.waset.org/abstracts/search?q=personality" title=" personality"> personality</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20space" title=" personal space"> personal space</a> </p> <a href="https://publications.waset.org/abstracts/83838/the-effects-of-ethnicity-personality-and-religiosity-on-desire-for-personal-space" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83838.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">201</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26418</span> Transformation of the Business Model in an Occupational Health Care Company Embedded in an Emerging Personal Data Ecosystem: A Case Study in Finland</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tero%20Huhtala">Tero Huhtala</a>, <a href="https://publications.waset.org/abstracts/search?q=Minna%20Pikkarainen"> Minna Pikkarainen</a>, <a href="https://publications.waset.org/abstracts/search?q=Saila%20Saraniemi"> Saila Saraniemi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information technology has long been used as an enabler of exchange for goods and services. Services are evolving from generic to personalized, and the reverse use of customer data has been discussed in both academia and industry for the past few years. This article presents the results of an empirical case study in the area of preventive health care services. The primary data were gathered in workshops, in which future personal data-based services were conceptualized by analyzing future scenarios from a business perspective. The aim of this study is to understand business model transformation in emerging personal data ecosystems. The work was done as a case study in the context of occupational healthcare. The results have implications to theory and practice, indicating that adopting personal data management principles requires transformation of the business model, which, if successfully managed, may provide access to more resources, potential to offer better value, and additional customer channels. These advantages correlate with the broadening of the business ecosystem. Expanding the scope of this study to include more actors would improve the validity of the research. The results draw from existing literature and are based on findings from a case study and the economic properties of the healthcare industry in Finland. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ecosystem" title="ecosystem">ecosystem</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20model" title=" business model"> business model</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data" title=" personal data"> personal data</a>, <a href="https://publications.waset.org/abstracts/search?q=preventive%20healthcare" title=" preventive healthcare"> preventive healthcare</a> </p> <a href="https://publications.waset.org/abstracts/58822/transformation-of-the-business-model-in-an-occupational-health-care-company-embedded-in-an-emerging-personal-data-ecosystem-a-case-study-in-finland" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58822.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">249</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26417</span> Home/Personal Budgeting: Implications for Financial Wellbeing of University Staffers in Ogun State Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ben-Caleb%20Egbide">Ben-Caleb Egbide</a>, <a href="https://publications.waset.org/abstracts/search?q=Egharevba%20Mathew"> Egharevba Mathew</a>, <a href="https://publications.waset.org/abstracts/search?q=Achugamonu%20Uzoma"> Achugamonu Uzoma</a>, <a href="https://publications.waset.org/abstracts/search?q=Faboyede%20Samuel"> Faboyede Samuel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The importance of budgeting in government and corporate entities as medium for the efficient management of scarce resources is self-evident. But when it comes to home or personal budgeting, there seem to be lingering misconceptions as regards its relevance. While most people view personal budgeting merely as a tool for tracking expenses and schedule for paying bills and indebtedness, very few consider it as one of the most important device for sound financial planning, money management instrument and/or wealth-creation mechanism. This paper is conceptualised to investigate the association between personal budgeting and financial well-being among staffers of tertiary institution in the South West Nigeria. Underpinned by the individualistic/cultural theory of well-being and the adoption of a survey research design, a structured questionnaire was used to gather data from a cross section of staff of tertiary Institutions in Ogun State. A Spearman Rank Correlation was utilised for analysis of data. The result indicates a high positive relationship between personal budgeting and tendencies for enhanced financial well-being among staff. The paper established that a change of value and behavioural pattern by individuals and household, especially in the areas of personal spending and budgeting could drastically reduce the incidence of the severity of financial stress, hence, enhanced wellness among staff. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=personal%20budgeting" title="personal budgeting">personal budgeting</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20well-being" title=" financial well-being"> financial well-being</a>, <a href="https://publications.waset.org/abstracts/search?q=tertiary%20institutions%20staffers" title=" tertiary institutions staffers"> tertiary institutions staffers</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a> </p> <a href="https://publications.waset.org/abstracts/78294/homepersonal-budgeting-implications-for-financial-wellbeing-of-university-staffers-in-ogun-state-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78294.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26416</span> Feature Selection of Personal Authentication Based on EEG Signal for K-Means Cluster Analysis Using Silhouettes Score</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jianfeng%20Hu">Jianfeng Hu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Personal authentication based on electroencephalography (EEG) signals is one of the important field for the biometric technology. More and more researchers have used EEG signals as data source for biometric. However, there are some disadvantages for biometrics based on EEG signals. The proposed method employs entropy measures for feature extraction from EEG signals. Four type of entropies measures, sample entropy (SE), fuzzy entropy (FE), approximate entropy (AE) and spectral entropy (PE), were deployed as feature set. In a silhouettes calculation, the distance from each data point in a cluster to all another point within the same cluster and to all other data points in the closest cluster are determined. Thus silhouettes provide a measure of how well a data point was classified when it was assigned to a cluster and the separation between them. This feature renders silhouettes potentially well suited for assessing cluster quality in personal authentication methods. In this study, “silhouettes scores” was used for assessing the cluster quality of k-means clustering algorithm is well suited for comparing the performance of each EEG dataset. The main goals of this study are: (1) to represent each target as a tuple of multiple feature sets, (2) to assign a suitable measure to each feature set, (3) to combine different feature sets, (4) to determine the optimal feature weighting. Using precision/recall evaluations, the effectiveness of feature weighting in clustering was analyzed. EEG data from 22 subjects were collected. Results showed that: (1) It is possible to use fewer electrodes (3-4) for personal authentication. (2) There was the difference between each electrode for personal authentication (p<0.01). (3) There is no significant difference for authentication performance among feature sets (except feature PE). Conclusion: The combination of k-means clustering algorithm and silhouette approach proved to be an accurate method for personal authentication based on EEG signals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=personal%20authentication" title="personal authentication">personal authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=K-mean%20clustering" title=" K-mean clustering"> K-mean clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=electroencephalogram" title=" electroencephalogram"> electroencephalogram</a>, <a href="https://publications.waset.org/abstracts/search?q=EEG" title=" EEG"> EEG</a>, <a href="https://publications.waset.org/abstracts/search?q=silhouettes" title=" silhouettes"> silhouettes</a> </p> <a href="https://publications.waset.org/abstracts/67078/feature-selection-of-personal-authentication-based-on-eeg-signal-for-k-means-cluster-analysis-using-silhouettes-score" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67078.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">285</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26415</span> The Economic Limitations of Defining Data Ownership Rights</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kacper%20Tomasz%20Kr%C3%B6ber-Mulawa">Kacper Tomasz Kröber-Mulawa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper will address the topic of data ownership from an economic perspective, and examples of economic limitations of data property rights will be provided, which have been identified using methods and approaches of economic analysis of law. To properly build a background for the economic focus, in the beginning a short perspective of data and data ownership in the EU’s legal system will be provided. It will include a short introduction to its political and social importance and highlight relevant viewpoints. This will stress the importance of a Single Market for data but also far-reaching regulations of data governance and privacy (including the distinction of personal and non-personal data, data held by public bodies and private businesses). The main discussion of this paper will build upon the briefly referred to legal basis as well as methods and approaches of economic analysis of law. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=antitrust" title="antitrust">antitrust</a>, <a href="https://publications.waset.org/abstracts/search?q=data" title=" data"> data</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20ownership" title=" data ownership"> data ownership</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20economy" title=" digital economy"> digital economy</a>, <a href="https://publications.waset.org/abstracts/search?q=property%20rights" title=" property rights"> property rights</a> </p> <a href="https://publications.waset.org/abstracts/170661/the-economic-limitations-of-defining-data-ownership-rights" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170661.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">81</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26414</span> Reform of the Law Relating to Personal Property Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ji%20Lian%20Yap">Ji Lian Yap</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper will critically consider developments in 2014 in relation to the law relating to security over personal property in Hong Kong. The rules governing the registration of charges under the Hong Kong Companies Ordinance will be examined. Case law relating to personal property security will also be discussed. The transplantation of the floating charge into China’s Property Law will also be considered. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=personal%20property" title="personal property">personal property</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20law" title=" security law"> security law</a>, <a href="https://publications.waset.org/abstracts/search?q=reform%20of%20the%20law" title=" reform of the law"> reform of the law</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a> </p> <a href="https://publications.waset.org/abstracts/19040/reform-of-the-law-relating-to-personal-property-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19040.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">425</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26413</span> Personal Data Protection: A Legal Framework for Health Law in Turkey</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Veli%20Durmus">Veli Durmus</a>, <a href="https://publications.waset.org/abstracts/search?q=Mert%20Uydaci"> Mert Uydaci</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Every patient who needs to get a medical treatment should share health-related personal data with healthcare providers. Therefore, personal health data plays an important role to make health decisions and identify health threats during every encounter between a patient and caregivers. In other words, health data can be defined as privacy and sensitive information which is protected by various health laws and regulations. In many cases, the data are an outcome of the confidential relationship between patients and their healthcare providers. Globally, almost all nations have own laws, regulations or rules in order to protect personal data. There is a variety of instruments that allow authorities to use the health data or to set the barriers data sharing across international borders. For instance, Directive 95/46/EC of the European Union (EU) (also known as EU Data Protection Directive) establishes harmonized rules in European borders. In addition, the General Data Protection Regulation (GDPR) will set further common principles in 2018. Because of close policy relationship with EU, this study provides not only information on regulations, directives but also how they play a role during the legislative process in Turkey. Even if the decision is controversial, the Board has recently stated that private or public healthcare institutions are responsible for the patient call system, for doctors to call people waiting outside a consultation room, to prevent unlawful processing of personal data and unlawful access to personal data during the treatment. In Turkey, vast majority private and public health organizations provide a service that ensures personal data (i.e. patient’s name and ID number) to call the patient. According to the Board’s decision, hospital or other healthcare institutions are obliged to take all necessary administrative precautions and provide technical support to protect patient privacy. However, this application does not effectively and efficiently performing in most health services. For this reason, it is important to draw a legal framework of personal health data by stating what is the main purpose of this regulation and how to deal with complicated issues on personal health data in Turkey. The research is descriptive on data protection law for health care setting in Turkey. Primary as well as secondary data has been used for the study. The primary data includes the information collected under current national and international regulations or law. Secondary data include publications, books, journals, empirical legal studies. Consequently, privacy and data protection regimes in health law show there are some obligations, principles and procedures which shall be binding upon natural or legal persons who process health-related personal data. A comparative approach presents there are significant differences in some EU member states due to different legal competencies, policies, and cultural factors. This selected study provides theoretical and practitioner implications by highlighting the need to illustrate the relationship between privacy and confidentiality in Personal Data Protection in Health Law. Furthermore, this paper would help to define the legal framework for the health law case studies on data protection and privacy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20protection" title="data protection">data protection</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data" title=" personal data"> personal data</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20law" title=" health law"> health law</a> </p> <a href="https://publications.waset.org/abstracts/91650/personal-data-protection-a-legal-framework-for-health-law-in-turkey" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91650.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">224</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26412</span> Factors Affecting Employee’s Effectiveness at Job in Banking Sectors of Pakistan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sajid%20Aman">Sajid Aman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Jobs in the banking sector in Pakistan are perceived as very tough, due to which employee turnover is very high. However, the managerial role is very important in influencing employees’ attitudes toward their turnout. This paper explores the manager’s role in influencing employees’ effectiveness on the job. The paper adopted a pragmatic approach by combining both qualitative and quantitative data. The study employed an exploratory sequential strategy under a mixed-method research design. Qualitative data was analyzed using thematic analysis. Five major themes, such as the manager’s attitude towards employees, his leadership style, listening to employee’s personal problems, provision of personal loans without interest and future career prospects, emerged as key factors increasing employee’s effectiveness in the banking sector. The quantitative data revealed that a manager’s attitude, leadership style, availability to listen to employees’ personal problems, and future career prospects and listening to employee’s personal problems are strongly associated with employees’ effectiveness at the job. However, personal loan without interest was noted as having no significant association with employee’s effectiveness at the job. The study concludes manager’s role is more important in the effectiveness of the employees at their job in the banking sector. It is suggested that managers should have a positive attitude towards employees and give time to listening to employee’s problems, even personal ones. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=banking%20sector" title="banking sector">banking sector</a>, <a href="https://publications.waset.org/abstracts/search?q=employee%E2%80%99s%20effectiveness" title=" employee’s effectiveness"> employee’s effectiveness</a>, <a href="https://publications.waset.org/abstracts/search?q=manager%E2%80%99s%20role" title=" manager’s role"> manager’s role</a>, <a href="https://publications.waset.org/abstracts/search?q=leadership%20style" title=" leadership style"> leadership style</a> </p> <a href="https://publications.waset.org/abstracts/187054/factors-affecting-employees-effectiveness-at-job-in-banking-sectors-of-pakistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187054.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">32</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26411</span> A Study on 5-11 Year-Old Children&#039;s Level of Knowledge about Personal Safety and Protection from Social Dangers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=%C3%96zden%20Ku%C5%9Fcu">Özden Kuşcu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ya%C4%9Fmur%20Ku%C5%9Fcu"> Yağmur Kuşcu</a>, <a href="https://publications.waset.org/abstracts/search?q=Zeynep%20%C3%87etinta%C5%9F"> Zeynep Çetintaş</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Sunay%20Yildirim%20Do%C4%9Fru"> S. Sunay Yildirim Doğru</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this work is to evaluate the effect of the subjects “personal safety” and “protection from dangers” included in primary school curriculum on the students’ levels of knowledge about safety and protection from social dangers. The study group included 469 students between 5–11 years old with 231 preschoolers and 238 primary school students and their parents and teachers. Instruments used to collect data were “Personal Safety Interview Form” for children, “Parent Interview Form” and “Teacher Interview Form”. Forms included 15 open-ended questions about personal safety. The researchers collected the research data through one-on-one interviews with children. Results of the study revealed that preschoolers and 1st, 2nd, and 3rd graders did not know their home addresses and telephone numbers and their families were not aware of that. The study also showed that those who had this information were unsure as to who to share this information with. Accordingly, more should be done to increase the levels of knowledge of preschoolers and 1st, 2nd, and 3rd graders about personal safety and protection from dangers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20danger" title=" social danger"> social danger</a>, <a href="https://publications.waset.org/abstracts/search?q=elementary%20school" title=" elementary school"> elementary school</a>, <a href="https://publications.waset.org/abstracts/search?q=preschool" title=" preschool"> preschool</a> </p> <a href="https://publications.waset.org/abstracts/20650/a-study-on-5-11-year-old-childrens-level-of-knowledge-about-personal-safety-and-protection-from-social-dangers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20650.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">457</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26410</span> Genetic Data of Deceased People: Solving the Gordian Knot</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Inigo%20de%20Miguel%20Beriain">Inigo de Miguel Beriain</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Genetic data of deceased persons are of great interest for both biomedical research and clinical use. This is due to several reasons. On the one hand, many of our diseases have a genetic component; on the other hand, we share genes with a good part of our biological family. Therefore, it would be possible to improve our response considerably to these pathologies if we could use these data. Unfortunately, at the present moment, the status of data on the deceased is far from being satisfactorily resolved by the EU data protection regulation. Indeed, the General Data Protection Regulation has explicitly excluded these data from the category of personal data. This decision has given rise to a fragmented legal framework on this issue. Consequently, each EU member state offers very different solutions. For instance, Denmark considers the data as personal data of the deceased person for a set period of time while some others, such as Spain, do not consider this data as such, but have introduced some specifically focused regulations on this type of data and their access by relatives. This is an extremely dysfunctional scenario from multiple angles, not least of which is scientific cooperation at the EU level. This contribution attempts to outline a solution to this dilemma through an alternative proposal. Its main hypothesis is that, in reality, health data are, in a sense, a rara avis within data in general because they do not refer to one person but to several. Hence, it is possible to think that all of them can be considered data subjects (although not all of them can exercise the corresponding rights in the same way). When the person from whom the data were obtained dies, the data remain as personal data of his or her biological relatives. Hence, the general regime provided for in the GDPR may apply to them. As these are personal data, we could go back to thinking in terms of a general prohibition of data processing, with the exceptions provided for in Article 9.2 and on the legal bases included in Article 6. This may be complicated in practice, given that, since we are dealing with data that refer to several data subjects, it may be complex to refer to some of these bases, such as consent. Furthermore, there are theoretical arguments that may oppose this hypothesis. In this contribution, it is shown, however, that none of these objections is of sufficient substance to delegitimize the argument exposed. Therefore, the conclusion of this contribution is that we can indeed build a general framework on the processing of personal data of deceased persons in the context of the GDPR. This would constitute a considerable improvement over the current regulatory framework, although it is true that some clarifications will be necessary for its practical application. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collective%20data%20conceptual%20issues" title="collective data conceptual issues">collective data conceptual issues</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20from%20deceased%20people" title=" data from deceased people"> data from deceased people</a>, <a href="https://publications.waset.org/abstracts/search?q=genetic%20data%20protection%20issues" title=" genetic data protection issues"> genetic data protection issues</a>, <a href="https://publications.waset.org/abstracts/search?q=GDPR%20and%20deceased%20people" title=" GDPR and deceased people"> GDPR and deceased people</a> </p> <a href="https://publications.waset.org/abstracts/137900/genetic-data-of-deceased-people-solving-the-gordian-knot" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/137900.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">154</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26409</span> Privacy Rights of Children in the Social Media Sphere: The Benefits and Challenges Under the EU and US Legislative Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anna%20Citterbergova">Anna Citterbergova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores the safeguards and guarantees to children’s personal data protection under the current EU and US legislative framework, namely the GDPR (2018) and COPPA (2000). Considering that children are online for the majority of their free time, one cannot overlook the negative side effects that may be associated with online participation, which may put children’s wellbeing and their fundamental rights at risk. The question of whether the current relevant legislative framework in relation to the responsibilities of the internet service providers (ISPs) are adequate safeguards and guarantees to children’s personal data protection has been an evolving debate both in the US and in the EU. From a children’s rights perspective, processors of personal data have certain obligations that must meet the international human rights principles (e. g. the CRC, ECHR), which require taking into account the best interest of the child. Accordingly, the need to protect children’s privacy online remains strong and relevant with the expansion of the number and importance of social media platforms to human life. At the same time, the landscape of the internet is rapidly evolving, and commercial interests are taking a more targeted approach in seeking children’s data. Therefore, it is essential to constantly evaluate the ongoing and evolving newly adopted market policies of ISPs that may misuse the gap in the current letter of the law. Previous studies in the field have already pointed out that both GDPR and COPPA may theoretically not be sufficient in protecting children’s personal data. With the focus on social media platforms, this study uses the doctrinal-descriptive method to identifiy the mechanisms enshrined in the GDPR and COPPA designed to protect children’s personal data. In its second part, the study includes a data gathering phase by the national data protection authorities responsible for monitoring and supervision of the GDPR in relation to children’s personal data protection who monitor the enforcement of the data protection rules throughout the European Union an contribute to their consistent application. These gathered primary source of data will later be used to outline the series of benefits and challenges to children’s persona lata protection faced by these institutes and the analysis that aims to suggest if and/or how to hold ISPs accountable while striking a fair balance between the commercial rights and the right to protection of the personal data of children. The preliminary results can be divided into two categories. First, conclusions in the doctrinal-descriptive part of the study. Second, specific cases and situations from the practice of national data protection authorities. While for the first part, concrete conclusions can already be presented, the second part is currently still in the data gathering phase. The result of this research is a comprehensive analysis on the safeguards and guarantees to children’s personal data protection under the current EU and US legislative framework, based on doctrinal-descriptive approach and original empirical data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=personal%20data%20of%20children" title="personal data of children">personal data of children</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data%20protection" title=" personal data protection"> personal data protection</a>, <a href="https://publications.waset.org/abstracts/search?q=GDPR" title=" GDPR"> GDPR</a>, <a href="https://publications.waset.org/abstracts/search?q=COPPA" title=" COPPA"> COPPA</a>, <a href="https://publications.waset.org/abstracts/search?q=ISPs" title=" ISPs"> ISPs</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a> </p> <a href="https://publications.waset.org/abstracts/153085/privacy-rights-of-children-in-the-social-media-sphere-the-benefits-and-challenges-under-the-eu-and-us-legislative-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153085.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">96</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26408</span> The Impact of the General Data Protection Regulation on Human Resources Management in Schools</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alexandra%20Aslanidou">Alexandra Aslanidou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The General Data Protection Regulation (GDPR), concerning the protection of natural persons within the European Union with regard to the processing of personal data and on the free movement of such data, became applicable in the European Union (EU) on 25 May 2018 and transformed the way personal data were being treated under the Data Protection Directive (DPD) regime, generating sweeping organizational changes to both public sector and business. A social practice that is considerably influenced in the way of its day-to-day operations is Human Resource (HR) management, for which the importance of GDPR cannot be underestimated. That is because HR processes personal data coming in all shapes and sizes from many different systems and sources. The significance of the proper functioning of an HR department, specifically in human-centered, service-oriented environments such as the education field, is decisive due to the fact that HR operations in schools, conducted effectively, determine the quality of the provided services and consequently have a considerable impact on the success of the educational system. The purpose of this paper is to analyze the decisive role that GDPR plays in HR departments that operate in schools and in order to practically evaluate the aftermath of the Regulation during the first months of its applicability; a comparative use cases analysis in five highly dynamic schools, across three EU Member States, was attempted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=general%20data%20protection%20regulation" title="general data protection regulation">general data protection regulation</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20resource%20management" title=" human resource management"> human resource management</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20system" title=" educational system"> educational system</a> </p> <a href="https://publications.waset.org/abstracts/117235/the-impact-of-the-general-data-protection-regulation-on-human-resources-management-in-schools" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117235.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">100</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26407</span> DURAFILE: A Collaborative Tool for Preserving Digital Media Files</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Santiago%20Macho">Santiago Macho</a>, <a href="https://publications.waset.org/abstracts/search?q=Miquel%20Montaner"> Miquel Montaner</a>, <a href="https://publications.waset.org/abstracts/search?q=Raivo%20Ruusalepp"> Raivo Ruusalepp</a>, <a href="https://publications.waset.org/abstracts/search?q=Ferran%20Candela"> Ferran Candela</a>, <a href="https://publications.waset.org/abstracts/search?q=Xavier%20Tarres"> Xavier Tarres</a>, <a href="https://publications.waset.org/abstracts/search?q=Rando%20Rostok">Rando Rostok</a> </p> <p class="card-text"><strong>Abstract:</strong></p> During our lives, we generate a lot of personal information such as photos, music, text documents and videos that link us with our past. This data that used to be tangible is now digital information stored in our computers, which implies a software dependence to make them accessible in the future. Technology, however, constantly evolves and goes through regular shifts, quickly rendering various file formats obsolete. The need for accessing data in the future affects not only personal users but also organizations. In a digital environment, a reliable preservation plan and the ability to adapt to fast changing technology are essential for maintaining data collections in the long term. We present in this paper the European FP7 project called DURAFILE that provides the technology to preserve media files for personal users and organizations while maintaining their quality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20preservation" title=" digital preservation"> digital preservation</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20search" title=" social search"> social search</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20preservation%20plans" title=" digital preservation plans"> digital preservation plans</a> </p> <a href="https://publications.waset.org/abstracts/25083/durafile-a-collaborative-tool-for-preserving-digital-media-files" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25083.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">445</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26406</span> Consumer Welfare in the Platform Economy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Prama%20Mukhopadhyay">Prama Mukhopadhyay</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Starting from transport to food, today’s world platform economy and digital markets have taken over almost every sphere of consumers’ lives. Sellers and buyers are getting connected through platforms, which is acting as an intermediary. It has made consumer’s life easier in terms of time, price, choice and other factors. Having said that, there are several concerns regarding platforms. There are competition law concerns like unfair pricing, deep discounting by the platforms which affect the consumer welfare. Apart from that, the biggest problem is lack of transparency with respect to the business models, how it operates, price calculation, etc. In most of the cases, consumers are unaware of how their personal data are being used. In most of the cases, they are unaware of how algorithm uses their personal data to determine the price of the product or even to show the relevant products using their previous searches. Using personal or non-personal data without consumer’s consent is a huge legal concern. In addition to this, another major issue lies with the question of liability. If a dispute arises, who will be responsible? The seller or the platform? For example, if someone ordered food through a food delivery app and the food was bad, in this situation who will be liable: the restaurant or the food delivery platform? In this paper, the researcher tries to examine the legal concern related to platform economy from the consumer protection and consumer welfare perspectives. The paper analyses the cases from different jurisdictions and approach taken by the judiciaries. The author compares the existing legislation of EU, US and other Asian Countries and tries to highlight the best practices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=competition" title="competition">competition</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer" title=" consumer"> consumer</a>, <a href="https://publications.waset.org/abstracts/search?q=data" title=" data"> data</a>, <a href="https://publications.waset.org/abstracts/search?q=platform" title=" platform"> platform</a> </p> <a href="https://publications.waset.org/abstracts/126042/consumer-welfare-in-the-platform-economy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/126042.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">144</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26405</span> Attempt to Reuse Used-PCs as Distributed Storage</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Toshiya%20Kawato">Toshiya Kawato</a>, <a href="https://publications.waset.org/abstracts/search?q=Shin-ichi%20Motomura"> Shin-ichi Motomura</a>, <a href="https://publications.waset.org/abstracts/search?q=Masayuki%20Higashino"> Masayuki Higashino</a>, <a href="https://publications.waset.org/abstracts/search?q=Takao%20Kawamura"> Takao Kawamura</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Storage for storing data is indispensable. If a storage capacity becomes insufficient, we can increase its capacity by adding new disks. It is, however, difficult to add a new disk when a budget is not enough. On the other hand, there are many unused idle resources such as used personal computers despite those use value. In order to solve those problems, used personal computers can be reused as storage. In this paper, we attempt to reuse used-PCs as a distributed storage. First, we list up the characteristics of used-PCs and design a storage system that utilizes its characteristics. Next, we experimentally implement an auto-construction system that automatically constructs a distributed storage environment in used-PCs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20storage" title="distributed storage">distributed storage</a>, <a href="https://publications.waset.org/abstracts/search?q=used%20personal%20computer" title=" used personal computer"> used personal computer</a>, <a href="https://publications.waset.org/abstracts/search?q=idle%20resource" title=" idle resource"> idle resource</a>, <a href="https://publications.waset.org/abstracts/search?q=auto%20construction" title=" auto construction"> auto construction</a> </p> <a href="https://publications.waset.org/abstracts/87359/attempt-to-reuse-used-pcs-as-distributed-storage" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87359.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">252</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26404</span> BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20Al%20Mamun">Abdullah Al Mamun</a>, <a href="https://publications.waset.org/abstracts/search?q=Talal%20Alkharobi"> Talal Alkharobi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=big%20data" title="big data">big data</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=hadoop" title=" hadoop"> hadoop</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20key" title=" public key"> public key</a> </p> <a href="https://publications.waset.org/abstracts/30986/bigcrypt-a-probable-approach-of-big-data-encryption-to-protect-personal-and-business-privacy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30986.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">320</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26403</span> Personal Income and the Social Confidence in Contemporary China: The Indirect Role of the Sense of Social Equity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wenfen%20Bi">Wenfen Bi</a>, <a href="https://publications.waset.org/abstracts/search?q=Zeng%20Lin"> Zeng Lin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As a developing country, China is badly in need of capital and talents to develop the socialist country with Chinese characteristics. However, a large proportion of high income people with know-how technique, wealth and management experience have immigrated or plan to immigrate to other countries. Of course, this phenomenon has attracted the attention from both the government and researchers. One explanation might be that these high-income people lack confidence in China’s social development. Based on the data on W city’s comprehensive social situation surveyed by center for the social survey research of Wuhan university (CSSR) in 2014, this paper employed the structural equation model (SEM) to evaluate whether personal income affects social confidence, via the mediating effect of the sense of social equity (sense of right equity and sense of distributive equity). Bootstrap mediation analysis revealed that after controlling Demographic variables, personal income had a significant negative influence on sense of right equity and in turn, sense of rights equity can significantly positively predict social confidence. While personal income had no significant effect on sense of distributive equity, and sense of distributive equity did not significantly affect macro social confidence. Also, the direct effects of personal income on social confidence became not significant. These findings revealed the inner mechanism of the relationship between the personal income and social confidence in contemporary China, which was caused by mediating effect of sense of rights equity. That is, the higher the personal income, the lower the sense of rights equity, the lower the social confidence. Thus, the boost of the social confidence, especially for the rich, does not only depend on the equitable distribution of material wealth, but also on the right equity and making people feel rights equally in common life. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=personal%20income" title="personal income">personal income</a>, <a href="https://publications.waset.org/abstracts/search?q=sense%20of%20right%20equity" title=" sense of right equity"> sense of right equity</a>, <a href="https://publications.waset.org/abstracts/search?q=sense%20of%20social%20equity" title=" sense of social equity"> sense of social equity</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20confidence" title=" social confidence"> social confidence</a> </p> <a href="https://publications.waset.org/abstracts/63097/personal-income-and-the-social-confidence-in-contemporary-china-the-indirect-role-of-the-sense-of-social-equity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63097.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26402</span> Subjective Well-Being through Coaching Process</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pendar%20Fazel">Pendar Fazel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Well-being is a good or satisfactory condition of existence; a state characterized by health, happiness, and prosperity. Well-being of people is correlated with, the cognitive, social, emotional, and physical aspect of their personality. Subjective well-being, people’s emotional and cognitive evaluations of their lives, includes what lay people call happiness, peace, fulfillment, and life satisfaction. Unfortunately in this period of time people are under the pressure of financial, social problems, and other stress factors which made them vulnerable, and their well-being is threatened. Personal Coaching as a holistic orientation and novel approach is ideal for the present century which help people, to find balance, enjoyment and meaning in their lives as well as improving performance, skills and effectiveness. The aim of the present article besides introducing the personal coaching is determining how personal coaching can positively effects on subjective well-being, under this aim we tend to describe how coaching impact on the cognitive and emotional reconstruction. Present qualitative research is descriptive analytic study, which data gathered by manual library research and search within authentic article through internet; analyzed personal coaching which integrated different views into an operational one helps people promote self-awareness as well as evaluate, emotional and cognitive aspect of their personality and provide appropriate subjective well-being. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=subjective%20well-being" title="subjective well-being">subjective well-being</a>, <a href="https://publications.waset.org/abstracts/search?q=coaching" title=" coaching"> coaching</a>, <a href="https://publications.waset.org/abstracts/search?q=well-being" title=" well-being"> well-being</a>, <a href="https://publications.waset.org/abstracts/search?q=positive%20psychology" title=" positive psychology"> positive psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20growth" title=" personal growth"> personal growth</a> </p> <a href="https://publications.waset.org/abstracts/34052/subjective-well-being-through-coaching-process" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34052.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">527</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26401</span> Legal Issues of Collecting and Processing Big Health Data in the Light of European Regulation 679/2016</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ioannis%20Iglezakis">Ioannis Iglezakis</a>, <a href="https://publications.waset.org/abstracts/search?q=Theodoros%20D.%20Trokanas"> Theodoros D. Trokanas</a>, <a href="https://publications.waset.org/abstracts/search?q=Panagiota%20Kiortsi"> Panagiota Kiortsi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper aims to explore major legal issues arising from the collection and processing of Health Big Data in the light of the new European secondary legislation for the protection of personal data of natural persons, placing emphasis on the General Data Protection Regulation 679/2016. Whether Big Health Data can be characterised as ‘personal data’ or not is really the crux of the matter. The legal ambiguity is compounded by the fact that, even though the processing of Big Health Data is premised on the de-identification of the data subject, the possibility of a combination of Big Health Data with other data circulating freely on the web or from other data files cannot be excluded. Another key point is that the application of some provisions of GPDR to Big Health Data may both absolve the data controller of his legal obligations and deprive the data subject of his rights (e.g., the right to be informed), ultimately undermining the fundamental right to the protection of personal data of natural persons. Moreover, data subject’s rights (e.g., the right not to be subject to a decision based solely on automated processing) are heavily impacted by the use of AI, algorithms, and technologies that reclaim health data for further use, resulting in sometimes ambiguous results that have a substantial impact on individuals. On the other hand, as the COVID-19 pandemic has revealed, Big Data analytics can offer crucial sources of information. In this respect, this paper identifies and systematises the legal provisions concerned, offering interpretative solutions that tackle dangers concerning data subject’s rights while embracing the opportunities that Big Health Data has to offer. In addition, particular attention is attached to the scope of ‘consent’ as a legal basis in the collection and processing of Big Health Data, as the application of data analytics in Big Health Data signals the construction of new data and subject’s profiles. Finally, the paper addresses the knotty problem of role assignment (i.e., distinguishing between controller and processor/joint controllers and joint processors) in an era of extensive Big Health data sharing. The findings are the fruit of a current research project conducted by a three-member research team at the Faculty of Law of the Aristotle University of Thessaloniki and funded by the Greek Ministry of Education and Religious Affairs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=big%20health%20data" title="big health data">big health data</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20subject%20rights" title=" data subject rights"> data subject rights</a>, <a href="https://publications.waset.org/abstracts/search?q=GDPR" title=" GDPR"> GDPR</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a> </p> <a href="https://publications.waset.org/abstracts/133310/legal-issues-of-collecting-and-processing-big-health-data-in-the-light-of-european-regulation-6792016" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/133310.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">129</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26400</span> Academic Goal Setting Practices of University Students in Lagos State, Nigeria: Implications for Counselling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asikhia%20Olubusayo%20Aduke">Asikhia Olubusayo Aduke</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Students’ inability to set data-based (specific, measurable, attainable, reliable, and time-bound) personal improvement goals threatens their academic success. Hence, the study aimed to investigate year-one students’ academic goal-setting practices at Lagos State University of Education, Nigeria. Descriptive survey research was used in carrying out this study. The study population consisted of 3,101 year-one students of the University. A sample size of five hundred (501) participants was selected through a proportional and simple random sampling technique. The Formative Goal Setting Questionnaire (FGSQ) developed by Research Collaboration (2015) was adapted and used as an instrument for the study. Two main research questions were answered, while two null hypotheses were formulated and tested for the study. The study revealed higher data-based goals for all students than personal improvement goals. Nevertheless, data-based and personal improvement goal-setting for female students was higher than for male students. One sample test statistic and Anova used to analyse data for the two hypotheses also revealed that the mean difference between male and female year one students’ data-based and personal improvement goal-setting formation was statistically significant (p < 0.05). This means year one students’ data-based and personal improvement goals showed significant gender differences. Based on the findings of this study, it was recommended, among others, that therapeutic techniques that can help to change students’ faulty thinking and challenge their lack of desire for personal improvement should be sought to treat students who have problems with setting high personal improvement goals. Counsellors also need to advocate continued research into how to increase the goal-setting ability of male students and should focus more on counselling male students’ goal-setting ability. The main contributions of the study are higher institutions must prioritize early intervention in first-year students' academic goal setting. Researching gender differences in this practice reveals a crucial insight: male students often lag behind in setting meaningful goals, impacting their motivation and performance. Focusing on this demographic with data-driven personal improvement goals can be transformative. By promoting goal setting that is specific, measurable, and focused on self-growth (rather than competition), male students can unlock their full potential. Researchers and counselors play a vital role in detecting and supporting students with lower goal-setting tendencies. By prioritizing this intervention, we can empower all students to set ambitious, personalized goals that ignite their passion for learning and pave the way for academic success. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20goal%20setting" title="academic goal setting">academic goal setting</a>, <a href="https://publications.waset.org/abstracts/search?q=counselling" title=" counselling"> counselling</a>, <a href="https://publications.waset.org/abstracts/search?q=practice" title=" practice"> practice</a>, <a href="https://publications.waset.org/abstracts/search?q=university" title=" university"> university</a>, <a href="https://publications.waset.org/abstracts/search?q=year%20one%20students" title=" year one students"> year one students</a> </p> <a href="https://publications.waset.org/abstracts/181569/academic-goal-setting-practices-of-university-students-in-lagos-state-nigeria-implications-for-counselling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/181569.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">61</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=personal%20data&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=personal%20data&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=personal%20data&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=personal%20data&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=personal%20data&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=personal%20data&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=personal%20data&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=personal%20data&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=personal%20data&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=personal%20data&amp;page=880">880</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=personal%20data&amp;page=881">881</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=personal%20data&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10