Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Private information

Nevertheless, as patents safeguard the innovator s private information as to the value of the innovation, incentives to innovate would be greater with patents than with grants. There is no a priori argument to tip the balance towards one alternative or the other. It is necessary to develop a formal model, as proposed by Shavell and Ypersele. [Pg.30]

After the approval of the product, the sponsor is requested to disclose GAIYO to the public except for the parts containing trade secrets and private information. The electronic version of GAIYO for disclosure can be obtained from http //www.info.pmda.go.jp/info/ syounin index.html. (Please note that the homepage is written in Japanese.)... [Pg.640]

Private information, by courtesy of Mr. Russell Peirucci of Siavely vSen.sors, Inc., Hartford, CT 06108. [Pg.235]

In the case of chemical exposures that are private goods, government (to the extent that it does anything at all) should limit its activities to the provision of information so individuals can decide for themselves which risks to bear. Command-and-control regulations inhibit the development of robust private information markets because people think that if a product is for sale, the government must have checked it out to ensure that its benefits were greater than its harms. [Pg.70]

May 8 Hackers gain access to prescription drug records of 8 million Virginia patients listed in the state s Drug Monitoring Program and cause concern about the release of private information. [Pg.116]

Scheme Initiation Every receiver u is assigned private information lu- For all 1 < < ru such that u G Si, lu allows u to deduce the key L corresponding to the set Sj. Note that the keys L, can be chosen either (i) uniformly at random and independently from each other (which we call the information-theoretic case) or (ii) as a function of other (secret) information (which we call the computational case), and thus may not be independent of each other. Scheme Initiation Every receiver u is assigned private information lu- For all 1 < < ru such that u G Si, lu allows u to deduce the key L corresponding to the set Sj. Note that the keys L, can be chosen either (i) uniformly at random and independently from each other (which we call the information-theoretic case) or (ii) as a function of other (secret) information (which we call the computational case), and thus may not be independent of each other.
The algorithm employed by CPRM is essentially a Subset-Cover scheme. Consider a table with A rows and C columns. Every device (receiver) is viewed as a collection of C entries from the table, exactly one from each column, that is u = [ui,..., uc] where Ui 0,1,..., A — 1. The collection of subsets 5i,..., defined by this algorithm correspond to subsets of receivers that share the same entry at a given column, namely Sr,i contains all receivers u = [ui,..., uc such that Ui = r. For every Q [Pg.19]

The effect on your study of the effect of stress on quality of care is a huge increase in cost and time attributed to the consent process. Each hospital that you selected to include in your survey had to certify independently that they are disclosing the bare minimum of only that information which is absolutely vital to your study in an Internal Review Board. After jumping through all the hoops, your study reaches significant conclusions and you learned a valuable lesson. You must plan your research in advance, have prepared consent forms, have an IRB waiver or know how to rapidly access the IRB, and be ready to start your study immediately. Most important, by following the HIPAA requirements you kept the private information of patients private and your perseverance advanced the field of study. [Pg.49]

No rerercncc to their explosive pro H rtics was given, btil private information is that they do not dilfet from the mother nitro compounds. [Pg.500]

In 1900, Ostwald mixed nitrogen and hydrogen gas in the presence of iron, and he detected small amounts of ammonia. Elated, he applied for a patent on his discovery and privately informed Germany s leading chemical companies of his breakthrough. [Pg.83]

Don t share your dirty laundry. Keep private information private. [Pg.5]

Woodward and Hoffmann had been privately informed of the method of correlation diagrams 3> and published in the same issue of the same journal a study of concerted intermolecular cycloaddition reactions, for which selection rules were established by means of correlation diagrams for molecular orbitals 4>. [Pg.9]

Confidentiality refers to how well private information is kept private, regardless of whether it is a patient, employee, or corporation. Information is available only to authorized persons, and none will be divulged to unauthorized individuals. This invokes the concept of security in the information system. In most cases, security is maintained in the system by introducing an appropriate user s I.D. and password format for each eligible user. Recent implementation of a federal law, the Hospital Insurance Portability and Accountability Act (HIPAA), has made it mandatory to insure stricter confidentiality measures in the healthcare system. A PACS should strictly meet this requirement. [Pg.93]

Sadly, the potential for exposure of private information to unauthorized persons has increased remarkably. There are huge temptations to use data for other purposes, and for it to be sold to others against the interests of the persons to whom the data relates. At the very least there is the resulting... [Pg.243]

Phish [pronounced same as fish] The verb representing the act of sending an email to a user, falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. [Pg.523]

From private information received by the author, the Ore seems to occur in veins of quartz. The low-grade ore carries more or less gold and silver. (A and B.) The principal localities are Nanning, Ssucheng, Taiping, and Hsilin districts, in Hunan province. [Pg.56]

If the information provided is freely accessible by any user on the network, the information is public. If accessibility is restricted, the information is private. Private information is accessible either to a closed group of users or by virtually any user if that user fulfils the requirements posed by the owner of the information. Most frequently, these requirements are only payment for the access. An obvious exception is government security information. [Pg.232]

Our approach is based on a natural way to negotiate in the real world. The proposed framework consists of two types of individuals the mediator and the players. All players and the mediator specify the issues they need to negotiate before the negotiation process starts. Each player keeps his own private information and he does not know his opponents private information. Each player reports his partial CP-nets to the mediator. They do not directly come to know their opponents preferences at any stage. In addition, each player defines... [Pg.176]

The individual partial CP-nets are known to the mediator only, whereas the UCP-nets are assumed to be private information. [Pg.193]

An engineer privately informs other city officials of an enviromnental threat, a problem her supervisor has ordered her not to disclose. [Pg.36]

No self-adhesive labels (post-its) are used in the laboratory, even for private information. [Pg.332]

Even though an optimal mechanism may exist for the supplier, this does not mean the supplier earns as much profit as he would if he knew the manufacturer s type. The gap between what a manufacturer earns with the menu of contracts and what the same manufacturer would earn if the supplier knew her type is called an information rent. A feature of these mechanisms is that separation of the manufacturer types goes hand in hand with a positive information rent, i.e., a manufacturer s private information allows the manufacturer to keep some rent that the manufacturer would not be able to keep if the supplier knew her type. Hence, even though there may be no cost to information revelation with a signaling game, the same is not true with a screening game. [Pg.57]


See other pages where Private information is mentioned: [Pg.514]    [Pg.32]    [Pg.69]    [Pg.82]    [Pg.135]    [Pg.19]    [Pg.10]    [Pg.199]    [Pg.199]    [Pg.242]    [Pg.496]    [Pg.497]    [Pg.128]    [Pg.408]    [Pg.509]    [Pg.43]    [Pg.7]    [Pg.14]    [Pg.95]    [Pg.398]    [Pg.246]    [Pg.269]    [Pg.187]    [Pg.142]    [Pg.19]    [Pg.53]    [Pg.57]   
See also in sourсe #XX -- [ Pg.53 , Pg.57 , Pg.144 , Pg.147 , Pg.148 , Pg.156 , Pg.192 , Pg.197 , Pg.249 , Pg.278 , Pg.568 ]




SEARCH



Private

Privatization

© 2024 chempedia.info