Buy sciencenetwork.eu ?

Products related to Protection:


  • Data Management in Large-Scale Education Research
    Data Management in Large-Scale Education Research

    Research data management is becoming more complicated.Researchers are collecting more data, using more complex technologies, all the while increasing the visibility of our work with the push for data sharing and open science practices.Ad hoc data management practices may have worked for us in the past, but now others need to understand our processes as well, requiring researchers to be more thoughtful in planning their data management routines. This book is for anyone involved in a research study involving original data collection.While the book focuses on quantitative data, typically collected from human participants, many of the practices covered can apply to other types of data as well.The book contains foundational context, instructions, and practical examples to help researchers in the field of education begin to understand how to create data management workflows for large-scale, typically federally funded, research studies.The book starts by describing the research life cycle and how data management fits within this larger picture.The remaining chapters are then organized by each phase of the life cycle, with examples of best practices provided for each phase.Finally, considerations on whether the reader should implement, and how to integrate those practices into a workflow, are discussed. Key Features:Provides a holistic approach to the research life cycle, showing how project management and data management processes work in parallel and collaborativelyCan be read in its entirety, or referenced as needed throughout the life cycleIncludes relatable examples specific to education researchIncludes a discussion on how to organize and document data in preparation for data sharing requirementsContains links to example documents as well as templates to help readers implement practices

    Price: 56.99 £ | Shipping*: 0.00 £
  • The Enterprise Data Catalog : Improve Data Discovery, Ensure Data Governance, and Enable Innovation
    The Enterprise Data Catalog : Improve Data Discovery, Ensure Data Governance, and Enable Innovation

    Combing the web is simple, but how do you search for data at work?It's difficult and time-consuming, and can sometimes seem impossible.This book introduces a practical solution: the data catalog.Data analysts, data scientists, and data engineers will learn how to create true data discovery in their organizations, making the catalog a key enabler for data-driven innovation and data governance. Author Ole Olesen-Bagneux explains the benefits of implementing a data catalog.You'll learn how to organize data for your catalog, search for what you need, and manage data within the catalog.Written from a data management perspective and from a library and information science perspective, this book helps you:Learn what a data catalog is and how it can help your organizationOrganize data and its sources into domains and describe them with metadataSearch data using very simple-to-complex search techniques and learn to browse in domains, data lineage, and graphsManage the data in your company via a data catalogImplement a data catalog in a way that exactly matches the strategic priorities of your organizationUnderstand what the future has in store for data catalogs

    Price: 52.99 £ | Shipping*: 0.00 £
  • Gender Differences in Technology and Innovation Management : Insights from Experimental Research
    Gender Differences in Technology and Innovation Management : Insights from Experimental Research

    Even though the number of working women has steadily increased over the last few years, women are still significantly under-represented in STEM activities (i.e. mathematics, informatics, science and technology). In order to eliminate this under-representation, numerous education policies and corporate initiatives, particularly in the recent past, have been aimed at increasing women's enthusiasm for STEM activities and professions.According to the latest surveys, however, it is clear that these efforts have not yet led to the desired success.Compared to their male counterparts, women continue to do fewer STEM activities. One possible reason for this is that relatively little is yet known about the concrete impact of the above education policies on working with innovation and technology: What are the gender differences between women and men?Is it enough to recognize these differences, or should these differences ideally not only be recognized, but also treated appropriately or even encouraged? This anthology deals with current topics in technology and innovation management against the background of these and other gender-relevant aspects.Empirical analyses and experiments in collaboration with companies from various sectors provide a sound scientific basis on which new results and findings are presented: How do women and men deal with creativity and competition?How are technologies applied and how can differences in access to technology be deduced? Answers to these and other questions help decision-makers in politics and business to proactively use the differences between women and men to motivate women to work in the STEM field and to strengthen them by acknowledging existing differences.

    Price: 96.50 £ | Shipping*: 0.00 £
  • Anglophone Literature in Second-Language Teacher Education : Curriculum Innovation through Intercultural Communication
    Anglophone Literature in Second-Language Teacher Education : Curriculum Innovation through Intercultural Communication

    Anglophone Literature in Second Language Teacher Education proposes new ways that literature, and more generally culture, can be used to educate future teachers of English as a second language.Arguing that the way literature is used in language teacher education can be transformed, the book foregrounds transnational approaches and shows how these can be applied in literature and cultural instruction to encourage intercultural awareness in future language educators.It draws on theoretical discussions from literary and cultural studies as well as applied linguistics and is an example how these cross-discipline conversations can take place, and thus help make Second-language teacher education (SLTE) programs more responsive to the challenges faced by future English-language teachers.Written in the idiom of literary scholarship, the book uses ideas of intercultural studies that have gained widespread support at research level, yet have not affected literature–cultural curricula in SLTE. As the first interdisciplinary study to suggest how SLTE programs can respond with curricula, this book will be of great interest for academics, scholars and post graduate students in the fields of applied linguistics, L2 and foreign language education, teacher education and post-graduate TESOL.It has universal appeal, addressing teaching faculty in any third-level institution that prepares language teachers and includes literary studies in their curriculum, as well as administrators in such organizations.

    Price: 38.99 £ | Shipping*: 0.00 £
  • Is Dropbox data protection secure?

    Dropbox has implemented various security measures to protect user data, including encryption, two-step verification, and regular security audits. However, no system is completely immune to security breaches, so it is important for users to also take precautions such as using strong passwords and being cautious with sharing sensitive information. Overall, Dropbox's data protection measures are robust, but users should still be vigilant about their own security practices.

  • What are data protection concerns?

    Data protection concerns refer to the worries and issues surrounding the security and privacy of personal and sensitive data. These concerns can include the risk of unauthorized access, data breaches, identity theft, and misuse of personal information. With the increasing amount of data being collected and stored by organizations, individuals are becoming more concerned about how their data is being used and protected. Data protection concerns also encompass the need for regulations and measures to ensure that data is handled and stored in a secure and responsible manner.

  • What is data protection on Discord?

    Data protection on Discord refers to the measures taken by the platform to safeguard user information and ensure privacy. This includes encryption of data during transmission, secure storage of personal data, and adherence to data protection laws such as the General Data Protection Regulation (GDPR). Discord also provides users with tools to manage their privacy settings and control the information they share with others. Overall, data protection on Discord aims to protect user data from unauthorized access and misuse.

  • How is data protection at TikTok?

    TikTok takes data protection and user privacy seriously by implementing various measures to safeguard user information. They have strict data security protocols in place to protect user data from unauthorized access, use, or disclosure. TikTok also provides users with privacy settings and controls to manage their data sharing preferences. Additionally, TikTok regularly updates its privacy policy and terms of service to ensure transparency and compliance with data protection regulations.

Similar search terms for Protection:


  • Data Protection Officer
    Data Protection Officer

    This book provides a practical guide to the DPO role, encompassing the key activities you’ll need to manage to succeed in the role.Coverage includes data protection fundamentals and processes, understanding risk and relevant standards, frameworks and tools, with DPO tips also embedded throughout the book and case studies included to support practice-based learning.

    Price: 19.99 £ | Shipping*: 3.99 £
  • Intercultural Communication Education and Research in the Middle East and North Africa
    Intercultural Communication Education and Research in the Middle East and North Africa

    This edited volume gathers insights into the production of knowledge about interculturality in education and research in the Middle East and North Africa (MENA). The MENA region is seen in this book as a space with unique circumstances, conditions, and complexities that need to be thoroughly explored and further unpacked.The book defines intercultural communication education and research broadly, but focuses on how teaching and researching interculturality is understood and practiced in MENA formal education classrooms and in various training situations such as business, politics, media and communication.This edited volume aims to (a) navigate representations of intercultural communication in education and research, starting from the premise that interculturality is not only a theory of analysis but also an activism for social and epistemic justice, (b) investigate specific phenomena, challenges, and issues in education and research, including concepts/notions such as acculturation and intercultural understanding/empathy, and (c) explore subfields of knowledge such as sense-making and intercultural pragmatics, and specific contexts of interculturality such as immigrants, exchange programs, and student mobilities. This book will be valuable read for students, educators, scholars, and policymakers interested in intercultural communication and education in the region, as well as language and sociology more broadly.

    Price: 135.00 £ | Shipping*: 0.00 £
  • Implementation of the Data Protection Directive in Relation to Medical Research in Europe
    Implementation of the Data Protection Directive in Relation to Medical Research in Europe

    The Data Protection and Medical Research in Europe: PRIVIREAL series focuses on the 'Privacy in Research Ethics and Law' EC-funded project examining the implementation of Directive 95/46/EC on data protection in relation to medical research and the role of ethics committees in European countries.The series consists of five separate volumes following the complete development of the PRIVIREAL project.This volume relates to the first stage of this project concerning the implementation of the Data Protection Directive, in particular in the area of medical research.It contains reports from 26 European countries on the implementation of the Directive, or the data protection regime, all with a specific focus on issues and questions relating to medical research.Presenting a unique resource for all those involved in data protection, medical research and their implications for each other, this title provides a valuable insight into the actual workings across Europe, including both the New Member States and the Newly Associated Member States.

    Price: 29.99 £ | Shipping*: 0.00 £
  • Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government
    Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government

    Even though blockchain technology was originally created as a ledger system for bitcoin to operate on, using it for areas other than cryptocurrency has become increasingly popular as of late.The transparency and security provided by blockchain technology is challenging innovation in a variety of businesses and is being applied in fields that include accounting and finance, supply chain management, and education.With the ability to perform such tasks as tracking fraud and securing the distribution of medical records, this technology is key to the advancement of many industries.The Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government is a vital reference source that examines the latest scholarly material on trends, techniques, and uses of blockchain technology applications in a variety of industries, and how this technology can further transparency and security.Highlighting a range of topics such as cryptography, smart contracts, and decentralized blockchain, this multi-volume book is ideally designed for academics, researchers, industry leaders, managers, healthcare professionals, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.

    Price: 2350.00 £ | Shipping*: 0.00 £
  • What is a data protection breach?

    A data protection breach is when there is unauthorized access, disclosure, or loss of personal or sensitive information. This can happen due to hacking, theft, or accidental exposure of data. Data protection breaches can have serious consequences, such as identity theft, financial loss, or damage to an individual's reputation. Organizations have a legal responsibility to protect the personal data they hold and must take steps to prevent breaches from occurring.

  • What is data protection at Vodafone?

    Data protection at Vodafone refers to the measures and practices put in place to safeguard the personal data of its customers and employees. This includes ensuring that data is collected and processed lawfully, securely stored, and only used for its intended purposes. Vodafone has strict policies and procedures in place to comply with data protection regulations, such as the General Data Protection Regulation (GDPR), and regularly conducts audits and assessments to ensure compliance and protect the privacy of individuals.

  • What is a data protection violation?

    A data protection violation occurs when there is unauthorized access, use, or disclosure of personal or sensitive information. This can include situations where data is stolen, leaked, or mishandled, leading to potential harm or privacy breaches for individuals. Data protection violations can also occur when organizations fail to comply with data protection laws and regulations, such as not obtaining proper consent for data collection or not implementing adequate security measures to protect the data. Violations of data protection can result in legal and financial consequences for the responsible parties.

  • Is there data protection on Facebook?

    Yes, Facebook has data protection measures in place to safeguard user information. Users can control who sees their posts, photos, and personal information through privacy settings. Additionally, Facebook has implemented security features such as two-factor authentication and encryption to protect user data from unauthorized access. However, it is important for users to be cautious about the information they share on the platform and to regularly review and update their privacy settings to ensure their data is protected.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.