Search Results - "Law"
Suggested Topics within your search.
Suggested Topics within your search.
- Law and legislation 3,507
- History 2,445
- Law 2,384
- Legal status, laws, etc 1,385
- Philosophy 876
- Constitutional law 666
- Politics and government 601
- International law 522
- Law reports, digests, etc 513
- Government policy 462
- Environmental law 451
- Civil rights 413
- Human rights 412
- Political aspects 408
- Commercial law 369
- Social aspects 342
- Social conditions 330
- Prevention 324
- Women 324
- Comparative law 320
- Political science 320
- Public law 310
- Moral and ethical aspects 298
- History and criticism 284
- International & Foreign Law/Comparative Law 264
- Economic aspects 254
- Economics 252
- European Law/Public International Law 246
- Religious aspects 238
- Environmental Law/Policy/Ecojustice 232
-
18281
Managing Risk and Information Security Protect to Enable /
Published 2013Get full text
Electronic eBook -
18282
Anything Goes : Charleston Conference Proceedings 2010 /
Published 2011Table of Contents: “…. -- The long arm of the law / Ann Okerson, William Hannay, Lauren K. Schoenthaler. -- E-everything, putting it all together / Peter McCracken. -- Innovative practices in electronic resources and acquisition management / Ryan Weir, Geoffrey P. …”
Full text available:
Electronic eBook -
18283
Managing Risk and Information Security Protect to Enable /
Published 2013Get full text
Electronic eBook -
18284
Anything Goes : Charleston Conference Proceedings 2010 /
Published 2011Table of Contents: “…. -- The long arm of the law / Ann Okerson, William Hannay, Lauren K. Schoenthaler. -- E-everything, putting it all together / Peter McCracken. -- Innovative practices in electronic resources and acquisition management / Ryan Weir, Geoffrey P. …”
Full text available:
Electronic eBook -
18285
Classical and modern engineering methods in fluid flow and heat transfer an introduction for engineers and students /
Published 2013Table of Contents: “…Laminar gradient flow with power-law free-stream velocity cx m -- 6.1.2.5. Asymmetric laminar-turbulent flow -- 6.2 Charts for solving conjugate heat transfer -- 6.2.1 Charts development -- 6.2.2 Using charts -- Exercises 6.1-6.17 -- 6.3 Applicability of charts and one-dimensional approach -- 6.3.1 Refining and estimating accuracy of the charts data -- 6.3.2 Applicability of thermally thin body assumption -- 6.3.3 Applicability of the one-dimensional approach and two-dimensional effects -- 6.4 Conjugate heat transfer in flow past plates -- Exercises 6.18-6.31 -- Conclusion of heat transfer investigation (chapters 4-6) -- Should any heat transfer problem be considered as a conjugate? …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18286
Classical and modern engineering methods in fluid flow and heat transfer an introduction for engineers and students /
Published 2013Table of Contents: “…Laminar gradient flow with power-law free-stream velocity cx m -- 6.1.2.5. Asymmetric laminar-turbulent flow -- 6.2 Charts for solving conjugate heat transfer -- 6.2.1 Charts development -- 6.2.2 Using charts -- Exercises 6.1-6.17 -- 6.3 Applicability of charts and one-dimensional approach -- 6.3.1 Refining and estimating accuracy of the charts data -- 6.3.2 Applicability of thermally thin body assumption -- 6.3.3 Applicability of the one-dimensional approach and two-dimensional effects -- 6.4 Conjugate heat transfer in flow past plates -- Exercises 6.18-6.31 -- Conclusion of heat transfer investigation (chapters 4-6) -- Should any heat transfer problem be considered as a conjugate? …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18287
Evaluation of enzyme inhibitors in drug discovery a guide for medicinal chemists and pharmacologists /
Published 2013Table of Contents: “…Kinetic of Biochemical Reactions.A1.1 The Law of Mass Action and Reaction Order.A1.2 First-Order Reaction Kinetics.A1.3 Second-Order Reaction Kinetics.A1.4 Pseudo-First-Order Reaction Conditions.A1.5 Approach to Equilibrium: An Example of the Kinetics of Reversible Reactions.References.Appendix 2. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18288
Evaluation of enzyme inhibitors in drug discovery a guide for medicinal chemists and pharmacologists /
Published 2013Table of Contents: “…Kinetic of Biochemical Reactions.A1.1 The Law of Mass Action and Reaction Order.A1.2 First-Order Reaction Kinetics.A1.3 Second-Order Reaction Kinetics.A1.4 Pseudo-First-Order Reaction Conditions.A1.5 Approach to Equilibrium: An Example of the Kinetics of Reversible Reactions.References.Appendix 2. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18289
Atomic absorption spectrometry : an introduction /
Published 2014An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18290
Atomic absorption spectrometry : an introduction /
Published 2014An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18291
Transboundary water resources management : a multidisciplinary approach /
Published 2011Table of Contents: “…Three Legal, Socio-Economic and Institutional Approaches -- 6.Legal Approaches -- 6.1.The Law of Transboundary Aquifers: Scope and Rippling Effects / Lilian Del Castillo-Laborde -- 6.1.1.Introduction -- 6.1.2.Legal Principles for Transboundary Aquifers -- 6.1.3.The Scope of the Draft Adopted by the UN General Assembly -- 6.1.4.Provisions Concerning Access -- 6.1.5.Provisions Concerning Utilization -- 6.1.6.Provisions Concerning Protection, Preservation and Management -- 6.1.6.1.Provisions on Duties -- 6.1.6.2.Provisions on Implementation Mechanisms -- 6.1.7.Provisions Concerning Technical Cooperation, Emergency Situations and Armed Conflict -- 6.1.8.Other Rules Applicable to Transboundary Shared Resources -- 6.1.9.Case study: The Guarani Aquifer System -- 6.1.10.Conclusions -- References -- Further Reading -- 6.2.Water Management Policies to Reduce over Allocation of Water Rights in the Rio Grande/Bravo Basin / Rebecca L. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18292
Transboundary water resources management : a multidisciplinary approach /
Published 2011Table of Contents: “…Three Legal, Socio-Economic and Institutional Approaches -- 6.Legal Approaches -- 6.1.The Law of Transboundary Aquifers: Scope and Rippling Effects / Lilian Del Castillo-Laborde -- 6.1.1.Introduction -- 6.1.2.Legal Principles for Transboundary Aquifers -- 6.1.3.The Scope of the Draft Adopted by the UN General Assembly -- 6.1.4.Provisions Concerning Access -- 6.1.5.Provisions Concerning Utilization -- 6.1.6.Provisions Concerning Protection, Preservation and Management -- 6.1.6.1.Provisions on Duties -- 6.1.6.2.Provisions on Implementation Mechanisms -- 6.1.7.Provisions Concerning Technical Cooperation, Emergency Situations and Armed Conflict -- 6.1.8.Other Rules Applicable to Transboundary Shared Resources -- 6.1.9.Case study: The Guarani Aquifer System -- 6.1.10.Conclusions -- References -- Further Reading -- 6.2.Water Management Policies to Reduce over Allocation of Water Rights in the Rio Grande/Bravo Basin / Rebecca L. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18293
The Emerald handbook of research management and administration around the world /
Published 2023Table of Contents: “…The profession of research management and administration in Ireland / John Donovan, Susie Cullinane, Doris Alexander, Peter Scott, and Jean van Sinderen Law -- Chapter 5.34. The profession of research management and administration in Italy / Valentina Romano, Annalisa Albanesi, Danilo Aceto Zumbo, Mirella Collini, Adele Del Bello, Daniela Grisi, and Francesca Mura -- Chapter 5.35. …”
Get full text
Electronic eBook -
18294
The Emerald handbook of research management and administration around the world /
Published 2023Table of Contents: “…The profession of research management and administration in Ireland / John Donovan, Susie Cullinane, Doris Alexander, Peter Scott, and Jean van Sinderen Law -- Chapter 5.34. The profession of research management and administration in Italy / Valentina Romano, Annalisa Albanesi, Danilo Aceto Zumbo, Mirella Collini, Adele Del Bello, Daniela Grisi, and Francesca Mura -- Chapter 5.35. …”
Get full text
Electronic eBook -
18295
Too Much is Not Enough : Charleston Conference Proceedings, 2013 /
Published 2014Table of Contents: “…-published research / Alicia Wise, Amy Friedlander, Howard Ratner, Judy Ruttenberg and John Wilbanks – Plato’s cave revisited / Bruce Heterick – The British national approach to scholarly communication / Lorraine Estelle – University presses and academic libraries demystified: a conversation / Leila Salisbury, Peter Berkery, Angela Carreño, Ellen Faran and Fred Heath – The long arm of the law / Ann Okerson, William Hannay, Bruce Strauch, Georgia Harper and Madelyn Wessel – Hyde Park corner debate: resolved: the current system of scholarly publishing, whereby publishers receive content for free and then sell it back to libraries at a high price, must fundamentally change / Elizabeth Chapman, Rick Anderson and Jean-Claude Guédon – I hear the train a comin’ / Greg Tananbaum, William Gunn and Lorraine Haricombe –…”
Full text available:
Electronic eBook -
18296
Too Much is Not Enough : Charleston Conference Proceedings, 2013 /
Published 2014Table of Contents: “…-published research / Alicia Wise, Amy Friedlander, Howard Ratner, Judy Ruttenberg and John Wilbanks – Plato’s cave revisited / Bruce Heterick – The British national approach to scholarly communication / Lorraine Estelle – University presses and academic libraries demystified: a conversation / Leila Salisbury, Peter Berkery, Angela Carreño, Ellen Faran and Fred Heath – The long arm of the law / Ann Okerson, William Hannay, Bruce Strauch, Georgia Harper and Madelyn Wessel – Hyde Park corner debate: resolved: the current system of scholarly publishing, whereby publishers receive content for free and then sell it back to libraries at a high price, must fundamentally change / Elizabeth Chapman, Rick Anderson and Jean-Claude Guédon – I hear the train a comin’ / Greg Tananbaum, William Gunn and Lorraine Haricombe –…”
Full text available:
Electronic eBook -
18297
Statistical disclosure control
Published 2012Table of Contents: “…Machine generated contents note: Preface vii Acknowledgements ix 1 Introduction 1 1.1 Concepts and Definitions 2 1.1.1 Disclosure 2 1.1.2 Statistical disclosure control 2 1.1.3 Tabular data 3 1.1.4 Microdata 3 1.1.5 Risk and utility 4 1.2 An approach to Statistical Disclosure Control 6 1.3 The chapters of the handbook 8 2 Ethics, Principles, Guidelines and Regulations, a general background 9 2.1 Introduction 9 2.2 Ethical codes and the new ISI code 9 2.2.1 ISI Declaration on Professional Ethics 10 2.2.2 New ISI Declaration on Professional Ethics 10 2.2.3 European Statistics Code of Practice 14 2.3 UNECE Principles and guidelines 14 2.4 Laws 17 2.4.1 Committee on Statistical Confidentiality 18 2.4.2 European Statistical System Committee 18 3 Microdata 21 3.1 Introduction 21 3.2 Microdata Concepts 22 3.2.1 Stage 1: Assess need for confidentiality protection 22 3.2.2 Stage 2: Key characteristics and uses of microdata 24 3.2.3 Stage 3: Disclosure risk 27 3.2.4 Stage 4: Protection methods 29 3.2.5 Stage 5: Implementation 30 3.3 Definitions of disclosure 32 3.3.1 Definitions of disclosure scenarios 33 3.4 Definitions of Disclosure Risk 34 3.4.1 Disclosure risk for categorical quasi-identifiers 35 3.4.2 Disclosure risk for continuous quasi-identifiers 37 3.5 Estimating Re-identification Risk 39 3.5.1 Individual risk based on the sample: threshold rule 39 3.5.2 Estimating individual risk using sampling weights 39 3.5.3 Estimating individual risk by Poisson model 42 3.5.4 Further models that borrow information from other sources 43 3.5.5 Estimating per record risk via heuristics 44 3.5.6 Assessing risk via record linkage 45 3.6 Non-Perturbative Microdata Masking 45 3.6.1 Sampling 46 3.6.2 Global recoding 46 3.6.3 Top and bottom coding 47 3.6.4 Local suppression 47 3.7 Perturbative Microdata Masking 48 3.7.1 Additive noise masking 48 3.7.2 Multiplicative noise masking 52 3.7.3 Microaggregation 54 3.7.4 Data swapping and rank swapping 66 3.7.5 Data shuffling 66 3.7.6 Rounding 67 3.7.7 Resampling 67 3.7.8 PRAM 67 3.7.9 MASSC 71 3.8 Synthetic and Hybrid Data 71 3.8.1 Fully synthetic data 72 3.8.2 Partially synthetic data 77 3.8.3 Hybrid data 79 3.8.4 Pros and cons of synthetic and hybrid data 88 3.9 Information Loss in Microdata 91 3.9.1 Information loss measures for continuous data 92 3.9.2 Information loss measures for categorical data 99 3.10 Release of multiple files from the same microdata set 101 3.11 Software 102 3.11.1 _-ARGUS 102 3.11.2 sdcMicro 103 3.11.3 IVEware 106 3.12 Case Studies 106 3.12.1 Microdata files at Statistics Netherlands 106 3.12.2 The European Labour Force Survey Microdata for Research Purposes 108 3.12.3 The European Structure of Earnings Survey Microdata for Research Purposes 111 3.12.4 NHIS Linked Mortality Data Public Use File, USA 117 3.12.5 Other real case instances 119 4 Magnitude tabular data 121 4.1 Introduction 121 4.1.1 Magnitude Tabular Data: Basic Terminology 121 4.1.2 Complex tabular data structures: hierarchical and linked tables 122 4.1.3 Risk Concepts 124 4.1.4 Protection Concepts 127 4.1.5 Information Loss Concepts 127 4.1.6 Implementation: Software, Guidelines and Case Study 127 4.2 Disclosure Risk Assessment I: Primary Sensitive Cells 128 4.2.1 Intruder Scenarios 128 4.2.2 Sensitivity rules 129 4.3 Disclosure Risk Assessment II: Secondary risk assessment 140 4.3.1 Feasibility Interval 141 4.3.2 Protection Level 142 4.3.3 Singleton and multi cell disclosure 143 4.3.4 Risk models for hierarchical and linked tables 144 4.4 Non-Perturbative Protection Methods 145 4.4.1 Global Recoding 145 4.4.2 The Concept of Cell Suppression 145 4.4.3 Algorithms for Secondary Cell Suppression 146 4.4.4 Secondary Cell Suppression in Hierarchical and Linked Tables 149 4.5 Perturbative Protection Methods 151 4.5.1 A pre-tabular method: Multiplicative Noise 152 4.5.2 A Post-tabular Method: Controlled Tabular Adjustment 153 4.6 Information Loss Measures for Tabular Data 153 4.6.1 Cell Costs for Cell Suppression 153 4.6.2 Cell Costs for CTA 154 4.6.3 Information Loss Measures to Evaluate the Outcome of Table Protection 155 4.7 Software for Tabular Data Protection 155 4.7.1 Empirical comparison of cell suppression algorithms 156 4.8 Guidelines: Setting up an efficient table model systematically 160 4.8.1 Defining Spanning Variables 161 4.8.2 Response Variables and Mapping Rules 162 4.9 Case Studies 164 4.9.1 Response Variables and Mapping Rules of the Case Study 164 4.9.2 Spanning Variables of the Case Study 165 4.9.3 Analysing the Tables of the Case Study 165 4.9.4 Software Issues of the Case Study 167 5 Frequency tables 169 5.1 Introduction 169 5.2 Disclosure risks 169 5.3 Methods 176 5.4 Post-tabular methods 178 5.4.1 Cell Suppression 178 5.4.2 ABS Cell Perturbation 179 5.4.3 Rounding 179 5.5 Information loss 184 5.6 Software 186 5.6.1 Introduction 186 5.7 Case Studies 188 5.7.1 UK Census 188 5.7.2 Australian and New Zealand Censuses 190 6 Data Access Issues 193 6.1 Introduction 193 6.2 Research Data Centres 193 6.3 Remote Execution 194 6.4 Remote Access 195 6.5 Licensing 196 6.6 Guidelines on output checking 196 6.6.1 Introduction 196 6.6.2 General approach 197 6.6.3 Rules for output checking 199 6.6.4 Organizational/procedural aspects of output checking 208 6.6.5 Researcher training 215 6.7 Additional issues concerning data access 218 6.7.1 Examples of disclaimers 218 6.7.2 Output description 218 6.8 Case Studies 219 6.8.1 The U.S. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18298
Statistical disclosure control
Published 2012Table of Contents: “…Machine generated contents note: Preface vii Acknowledgements ix 1 Introduction 1 1.1 Concepts and Definitions 2 1.1.1 Disclosure 2 1.1.2 Statistical disclosure control 2 1.1.3 Tabular data 3 1.1.4 Microdata 3 1.1.5 Risk and utility 4 1.2 An approach to Statistical Disclosure Control 6 1.3 The chapters of the handbook 8 2 Ethics, Principles, Guidelines and Regulations, a general background 9 2.1 Introduction 9 2.2 Ethical codes and the new ISI code 9 2.2.1 ISI Declaration on Professional Ethics 10 2.2.2 New ISI Declaration on Professional Ethics 10 2.2.3 European Statistics Code of Practice 14 2.3 UNECE Principles and guidelines 14 2.4 Laws 17 2.4.1 Committee on Statistical Confidentiality 18 2.4.2 European Statistical System Committee 18 3 Microdata 21 3.1 Introduction 21 3.2 Microdata Concepts 22 3.2.1 Stage 1: Assess need for confidentiality protection 22 3.2.2 Stage 2: Key characteristics and uses of microdata 24 3.2.3 Stage 3: Disclosure risk 27 3.2.4 Stage 4: Protection methods 29 3.2.5 Stage 5: Implementation 30 3.3 Definitions of disclosure 32 3.3.1 Definitions of disclosure scenarios 33 3.4 Definitions of Disclosure Risk 34 3.4.1 Disclosure risk for categorical quasi-identifiers 35 3.4.2 Disclosure risk for continuous quasi-identifiers 37 3.5 Estimating Re-identification Risk 39 3.5.1 Individual risk based on the sample: threshold rule 39 3.5.2 Estimating individual risk using sampling weights 39 3.5.3 Estimating individual risk by Poisson model 42 3.5.4 Further models that borrow information from other sources 43 3.5.5 Estimating per record risk via heuristics 44 3.5.6 Assessing risk via record linkage 45 3.6 Non-Perturbative Microdata Masking 45 3.6.1 Sampling 46 3.6.2 Global recoding 46 3.6.3 Top and bottom coding 47 3.6.4 Local suppression 47 3.7 Perturbative Microdata Masking 48 3.7.1 Additive noise masking 48 3.7.2 Multiplicative noise masking 52 3.7.3 Microaggregation 54 3.7.4 Data swapping and rank swapping 66 3.7.5 Data shuffling 66 3.7.6 Rounding 67 3.7.7 Resampling 67 3.7.8 PRAM 67 3.7.9 MASSC 71 3.8 Synthetic and Hybrid Data 71 3.8.1 Fully synthetic data 72 3.8.2 Partially synthetic data 77 3.8.3 Hybrid data 79 3.8.4 Pros and cons of synthetic and hybrid data 88 3.9 Information Loss in Microdata 91 3.9.1 Information loss measures for continuous data 92 3.9.2 Information loss measures for categorical data 99 3.10 Release of multiple files from the same microdata set 101 3.11 Software 102 3.11.1 _-ARGUS 102 3.11.2 sdcMicro 103 3.11.3 IVEware 106 3.12 Case Studies 106 3.12.1 Microdata files at Statistics Netherlands 106 3.12.2 The European Labour Force Survey Microdata for Research Purposes 108 3.12.3 The European Structure of Earnings Survey Microdata for Research Purposes 111 3.12.4 NHIS Linked Mortality Data Public Use File, USA 117 3.12.5 Other real case instances 119 4 Magnitude tabular data 121 4.1 Introduction 121 4.1.1 Magnitude Tabular Data: Basic Terminology 121 4.1.2 Complex tabular data structures: hierarchical and linked tables 122 4.1.3 Risk Concepts 124 4.1.4 Protection Concepts 127 4.1.5 Information Loss Concepts 127 4.1.6 Implementation: Software, Guidelines and Case Study 127 4.2 Disclosure Risk Assessment I: Primary Sensitive Cells 128 4.2.1 Intruder Scenarios 128 4.2.2 Sensitivity rules 129 4.3 Disclosure Risk Assessment II: Secondary risk assessment 140 4.3.1 Feasibility Interval 141 4.3.2 Protection Level 142 4.3.3 Singleton and multi cell disclosure 143 4.3.4 Risk models for hierarchical and linked tables 144 4.4 Non-Perturbative Protection Methods 145 4.4.1 Global Recoding 145 4.4.2 The Concept of Cell Suppression 145 4.4.3 Algorithms for Secondary Cell Suppression 146 4.4.4 Secondary Cell Suppression in Hierarchical and Linked Tables 149 4.5 Perturbative Protection Methods 151 4.5.1 A pre-tabular method: Multiplicative Noise 152 4.5.2 A Post-tabular Method: Controlled Tabular Adjustment 153 4.6 Information Loss Measures for Tabular Data 153 4.6.1 Cell Costs for Cell Suppression 153 4.6.2 Cell Costs for CTA 154 4.6.3 Information Loss Measures to Evaluate the Outcome of Table Protection 155 4.7 Software for Tabular Data Protection 155 4.7.1 Empirical comparison of cell suppression algorithms 156 4.8 Guidelines: Setting up an efficient table model systematically 160 4.8.1 Defining Spanning Variables 161 4.8.2 Response Variables and Mapping Rules 162 4.9 Case Studies 164 4.9.1 Response Variables and Mapping Rules of the Case Study 164 4.9.2 Spanning Variables of the Case Study 165 4.9.3 Analysing the Tables of the Case Study 165 4.9.4 Software Issues of the Case Study 167 5 Frequency tables 169 5.1 Introduction 169 5.2 Disclosure risks 169 5.3 Methods 176 5.4 Post-tabular methods 178 5.4.1 Cell Suppression 178 5.4.2 ABS Cell Perturbation 179 5.4.3 Rounding 179 5.5 Information loss 184 5.6 Software 186 5.6.1 Introduction 186 5.7 Case Studies 188 5.7.1 UK Census 188 5.7.2 Australian and New Zealand Censuses 190 6 Data Access Issues 193 6.1 Introduction 193 6.2 Research Data Centres 193 6.3 Remote Execution 194 6.4 Remote Access 195 6.5 Licensing 196 6.6 Guidelines on output checking 196 6.6.1 Introduction 196 6.6.2 General approach 197 6.6.3 Rules for output checking 199 6.6.4 Organizational/procedural aspects of output checking 208 6.6.5 Researcher training 215 6.7 Additional issues concerning data access 218 6.7.1 Examples of disclaimers 218 6.7.2 Output description 218 6.8 Case Studies 219 6.8.1 The U.S. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18299
-
18300