![]() Martin, Romain ![]() ![]() Presentation (2012, May 04) Detailed reference viewed: 89 (2 UL)![]() Cramer, Marcos ![]() ![]() Report (2018) Detailed reference viewed: 170 (13 UL)![]() Odenbreit, Christoph ![]() Report (2021) The unsafety of current design rules for novel types of open-trough deck geometries for the resistance of headed studs in profiled steel sheeting is well known [1] and it was the main reason behind the ... [more ▼] The unsafety of current design rules for novel types of open-trough deck geometries for the resistance of headed studs in profiled steel sheeting is well known [1] and it was the main reason behind the nomination of CEN/TC250/SC4- Task SC4.T3: “Revised rules for shear connection in the presence of modern forms of profiled sheeting”. During the RFCS research project “DISCCO” (RFCS-CT-2012-00030) [1], a mechanical model was developed on the basis of a large literature study and previous studies [2, 3, 4, 5, 6] while the corresponding design equations were presented by CEN/TC250/SC4.PT3 and further enhanced during the Research Project “ShearCON” of University of Luxembourg. In order to let the current rules of EN 1994-1-1 6.6 (Eq.(2) and (3)) as unchanged as possible, the limits of its suitable field of applicability (Database B1) was investigated thoroughly by means of the statistical procedure of EN 1990 D.8 [7]. The newly proposed equations (Eq. (7) and (8)) apply only to the cases outside these limits (Database B2). In this way, the proposed solution is able to restore the level of safety to its initial value, so that the partial safety factor for the shear connection ϒV=1.25 is adequate. Conversely, the current situation (without including the new design equations) would need a much higher partial safety factor as shown below. [less ▲] Detailed reference viewed: 81 (7 UL)![]() Samir Labib, Nader ![]() ![]() ![]() in Technical report on data protection and privacy in smart ICT (2019), 1 With the emergence of new digital trends like the Internet of Things (IoT), more industry actors and technical committees pursue research in utilizing such technologies as they promise better and ... [more ▼] With the emergence of new digital trends like the Internet of Things (IoT), more industry actors and technical committees pursue research in utilizing such technologies as they promise better and optimized management, improved energy efficiency and better quality living by facilitating a magnitude of value-added services. However, as communication, sensing and actuation become increasingly sophisticated, such promising data-driven IoT systems generate, process, and exchange larger amounts of data, some of which is privacy-sensitive and security-critical. The sustained increase in number of connected devices, catalyzed by IoT, affirms the importance of addressing data protection, privacy and security challenges, as indices of trust, to achieve market acceptance. This consequently, emphasizes the need of a solid technical and regulatory foundation to ensure trustworthiness within the IoT ecosystem. The goal of this study is to first introduce the concept of trustworthiness in IoT with its main pillars, data protection, privacy and security, and then analyze developments in research and standardization for each of these. The study presents a gap analysis on data protection, privacy and security between research and standardization, throughout which the use case of Unmanned Aerial Vehicles (UAVs) is referred to, as a promising value-added service example of mobile IoT devices. The study concludes with suggestions for future research and standardization in order to address the identified gaps. [less ▲] Detailed reference viewed: 93 (14 UL)![]() ; ; et al in Pediatric diabetes (2012), 13(16), 39-48 BACKGROUND: One of the most important tasks of the SWEET study is benchmarking the data collected. Information on the occurrence of the disease of diabetes, the treatment, and their outcomes in children ... [more ▼] BACKGROUND: One of the most important tasks of the SWEET study is benchmarking the data collected. Information on the occurrence of the disease of diabetes, the treatment, and their outcomes in children from the different member states of European Union (EU) is crucial. How the collection of data is realized is essential, concerning both the technical issues and the results. The creation of SWEET Centers of Reference (CoR), all over Europe will be facilitated by the access to safe data collection, where legal aspects and privacy are ascertained. OBJECTIVE: To describe the rationale for- and the technical procedure in the data collection implementation, in the SWEET study. SUBJECTS: Selected data on all patients treated at SWEET CoR are collected. METHODS: The SWEET project data collection and management system, consists of modular components for data collection, online data interchange, and a database for statistical analysis. CONCLUSION: The SWEET study and the organization of CoR aims for the goal of offering an updated, secure, and continuous evaluation of diabetes treatment regimens for all children with diabetes in Europe. To support this goal, an appropriate and secure data management system as described in this paper has been created. [less ▲] Detailed reference viewed: 93 (0 UL)![]() Danescu, Elena ![]() Scientific Conference (2022, February 04) The digital turn has considerably impacted geopolitics in terms of power, governance and regulation, leading to a proliferation of stakeholders and networks at multiple levels (states, international ... [more ▼] The digital turn has considerably impacted geopolitics in terms of power, governance and regulation, leading to a proliferation of stakeholders and networks at multiple levels (states, international organisations, private companies, civil society and citizens), new dynamics of competition in a transnational space that is becoming increasingly virtual, borderless and deterritorialised (cyberspace), and novel forms of learning, work and human activity. Digital technologies have also brought about a paradigm shift in information and communication systems, with the emergence of new media (online platforms, interactive websites, algorithmic decision-making ecosystems, etc.) that will have a long-term impact on social and cultural practices, interpersonal and societal relations, the public sphere and the exercise of individual and collective democracy. [less ▲] Detailed reference viewed: 79 (0 UL)![]() Ullrich, Carsten ![]() Presentation (2018, May) Detailed reference viewed: 82 (4 UL)![]() Greiff, Samuel ![]() Presentation (2012, October 15) Detailed reference viewed: 59 (1 UL)![]() Helfer, Malte ![]() Book published by Akademie-Verlag (1990) Detailed reference viewed: 94 (0 UL)![]() ![]() Krebs, Stefan ![]() Scientific Conference (2018) Detailed reference viewed: 61 (1 UL)![]() Krebs, Stefan ![]() Book published by Franz steiner Verlag (2009) Detailed reference viewed: 71 (4 UL)![]() Treleani, Matteo ![]() in Ina GLOBAL (2015) Detailed reference viewed: 79 (0 UL)![]() Sainlez, Matthieu ![]() Poster (2009) Detailed reference viewed: 67 (0 UL)![]() ; ; Max, Charles ![]() in Journal of Technical Education (2018), 6(4), An international research team jointly conceived an item development model which was used to develop a new test instrument to measure the technology literacy of secondary school students. This tool was ... [more ▼] An international research team jointly conceived an item development model which was used to develop a new test instrument to measure the technology literacy of secondary school students. This tool was used to assess the literacy skills of 270 pupils from Germany, Switzerland, Luxembourg, the Netherlands and England. The results show that 13 to 16 year old students display a poorly developed technology literacy level only. 25 per cent of the items on average were incorrectly answered with a high certainty sentiment, which suggests, that students do not only lack relevant knowledge in the field of technology but in addition also hold a rela-tively high number of strongly built misconceptions. Interestingly, there are no major differences between countries and gender. [less ▲] Detailed reference viewed: 126 (2 UL)![]() Jütte, Bernd Justin ![]() in Taeger, Jürgen (Ed.) Big Data & Co - Neue Herausforderungen für das Informationsrecht Tagungsband Herbstakademie 2014 (2014) Technische Schutzmaßnahmen an der Schnittstelle der Interessen von Rechteinhabern und Nutzerinteressen – u.a. die Rechtsprechung des EuGH in Nintendo v PC Box (EuGH Rs. C-355/12) Eine grundlegende ... [more ▼] Technische Schutzmaßnahmen an der Schnittstelle der Interessen von Rechteinhabern und Nutzerinteressen – u.a. die Rechtsprechung des EuGH in Nintendo v PC Box (EuGH Rs. C-355/12) Eine grundlegende Funktion von Ureberrechten ist es, einen Ausgleich zwischen den Rechten von Autoren und anderen Rechteinhabern auf der einen Seite und Nutzern von geschützten Werken auf der anderen Seite herzustellen. Technische Schutzmaßnah-men sind ein Mittel für Rechteinhaber die Nutzung ihrer Werke einzuschränken und da-mit widerrechtliche Nutzungen zu unterbinden. Schutzmaßnahmen können jedoch auch gesetzlich erlaubte Handlungen einschränken. Das Unionsrecht nimmt mit Artikel 6 der Urheberrechtsrichtlinie (RL 2001/29/EC) die Mitgliedssaaten in die Pflicht, Rechteinhabern Rechtschutz für die Umgehung techni-scher Schutzmaßnahmen zur Verfügung zu stellen. Gleichzeitig stellt die Richtlinie klar, dass Nutzer urheberrechtlich geschützter Werke von gewissen urheberrechtlichen Schranken profitieren sollen, welche wiederrum nicht durch technische Schutzmaßnah-men praktisch eingegrenzt werden dürfen. Wie sich diese Rechtebeziehung konkret in Anwendungsfällen des Artikel 6 der Urheberrechtsrichtlinie darstellt, ist Gegenstand die-ses Papers. Während andere Aspekte der Urheberrechtsrichtlinie, zwar nicht erschöpfend, aber zu-mindest jedoch ausführlich diskutiert worden sind, ist Artikel 6 bisher wenig Aufmerk-samkeit beschieden worden. Mit Nintendo v PC Box hat der EuGH erstmals eine Frage zur Vorabentscheidung vorgelegt bekommen, die sich hauptsächlich mit technischen Schutzmaßnahmen beschäftigt. Allerdings wurden schon vorher solche Maßnahmen vom Gericht tangential diskutiert. Das jüngste Urteil lässt zumindest erahnen, wie sich Artikel 6 in das Gefüge des europäischen Urheberechte einfügen wird, und vor allem, inwieweit ein Interessenausgleich durch technischen Schutzmaßnahmen wirksam Ge-stalt annehmen könnte. Das Paper betrachtet konkret zwei Anwendungsfälle von technischen Schutzmaßnah-men, die – direkt oder indirekt – Gegenstand von Vorlagefragen vor dem Gerichtshof waren. [less ▲] Detailed reference viewed: 83 (4 UL)![]() Sprenger, Birte ![]() in Ermann, Ulrich; Ilieva, Margarita (Eds.) Bulgarien: Aktuelle Entwicklungen und Probleme (2006) This book chapter deals with the Bulgarian technical and social infrastructure and its challenges. Detailed reference viewed: 94 (1 UL)![]() Fickers, Andreas ![]() in Journal of British Cinema and Television (2010) Detailed reference viewed: 251 (0 UL)![]() Tröhler, Daniel ![]() in Journal of Educational Media, Memory, and Society (2013), 5(2), 1-19 This article investigates the development of new teaching ideologies in the context of the technocratic ideology of the Cold War. These ideologies did not simply vanish after 1989. The catchwords were ... [more ▼] This article investigates the development of new teaching ideologies in the context of the technocratic ideology of the Cold War. These ideologies did not simply vanish after 1989. The catchwords were “programmed instruction” and “teaching machines”, accompanied by the promise that all students would make effi cient learning progress. Although Eastern and Western states fought the Cold War over political ideologies, their teaching ideologies (perhaps surprisingly) converged. This may explain why neither the apparent failure of these educational ideologies nor the end of the Cold War led to the modifi cation of the ideologies themselves, but rather to the modifi cation of devices serving the ideologies. [less ▲] Detailed reference viewed: 172 (12 UL)![]() Carr, Constance ![]() ![]() in Planning Theory and Practice (2022) Large digital corporations such as Amazon.com or Alphabet Inc. are forging their position in cities by promoting themselves as the sole providers of so-called essential urban infrastructures. In this ... [more ▼] Large digital corporations such as Amazon.com or Alphabet Inc. are forging their position in cities by promoting themselves as the sole providers of so-called essential urban infrastructures. In this paper, we reflect on how the behaviours of these current-day ‘tech giants’ are similar to those of the mid-20th century, a time period also known for dramatic infrastructural change in North American and Europe. Specifically, we are reminded of Robert Moses and how he pushed for infrastructural change in New York City and State, which were also supposedly the height of state-of-the-art urban planning at the time. He pushed his agenda, however, by brokering power and strong-arming the urban and regional development field. We reflect on Alphabet Inc.’s project in Toronto and Amazon’s search for a second headquarters in New York City and how these LDCs were similarly armed with executive and financial power and an ability to bully the field of urban development in their own interest. Behaving as digital-age power brokers, they engaged managerial-technocratic modes of urban governance to instigate projects that ultimately failed. We argue that Alphabet’s and Amazon’s strategies not only resemble those of Moses, but that all three deploy tactics that debase planning practice itself. [less ▲] Detailed reference viewed: 72 (5 UL)![]() ; Billieux, Joël ![]() in Addictive behaviors (2017), 64 Detailed reference viewed: 164 (2 UL) |
||