Essays about: "Personal Data Transfer"
Showing result 1 - 5 of 48 essays containing the words Personal Data Transfer.
-
1. GDPR Compliance in EU-US Data Transfers - Examining the impact of the EU Commission’s 2023 adequacy decision on surveillance risks
University essay from Lunds universitet/Institutionen för handelsrättAbstract : International data transfers serve to support the global economy, facilitating international collaboration and economic expansion. However this increased productivity comes at a cost, namely amplified personal data privacy and security risks. READ MORE
-
2. Erratic Patterns : Unravelling the Cultural Transfers of Library Classifiers
University essay from Uppsala universitet/Institutionen för ABMAbstract : This thesis investigates the oft-overlooked influence of the classifier's input during the assignment of library classifications and draws upon cultural transfer theory to shed light on the underlying principles that guide the process. Classifiers' personal knowledge, experience, and beliefs, have a critical role in determining the 'aboutness' of a work and its subsequent classification. READ MORE
-
3. Implementation of IIOT technology in welding robots for improving connectivity and enhancing productivity
University essay from KTH/ProduktionsutvecklingAbstract : In the prevailing industrial revolution, most industries are on the path towards the digitalization journey. To incorporate several digital technologies in the organization data reliability and accuracy act as key enablers. To achieve the set goals, the connectivity of the machines is considered a prominent endeavour. READ MORE
-
4. Transcending Memories Beyond Borders: Carrying Memorabilia from Home to Abroad. : Transferring Personal Memorabilia for a Meaningful Cross-Country Experience.
University essay from Uppsala universitet/Människa-datorinteraktionAbstract : Collecting memorabilia has been a longstanding practice as it evolved around cultures and societies. Despite existing research about preserving memorabilia, meaningful preservation methods remain unclear due to the individual and idiosyncratic nature of practices [18,22,40,43,47,59]. READ MORE
-
5. Secrecy Capacity of Cooperative Transmission with Opportunistic Relaying Scheme
University essay fromAbstract : The usage of wireless communication has increased over the past few years. Most wired communications are replaced by wireless communication for ease of use. Wireless communication transfers confidential information like personal information and credentials between two entities. READ MORE