{"title":"E-Government Identity Management","authors":"","doi":"10.1017/9781780688459.024","DOIUrl":"https://doi.org/10.1017/9781780688459.024","url":null,"abstract":"","PeriodicalId":211467,"journal":{"name":"Data Protection Law in the EU: Roles, Responsibilities and Liability","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123967160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Emergence of Data Protection Law","authors":"","doi":"10.1017/9781780688459.016","DOIUrl":"https://doi.org/10.1017/9781780688459.016","url":null,"abstract":"","PeriodicalId":211467,"journal":{"name":"Data Protection Law in the EU: Roles, Responsibilities and Liability","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131121693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing","authors":"Paulina Hoang","doi":"10.1017/9781780688459.026","DOIUrl":"https://doi.org/10.1017/9781780688459.026","url":null,"abstract":"By: Paulina Hoang IT 103Section 010 October 3, 2011 Honor Code: \"By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://academicintegrity.gmu.edu/honorcode/ . I am fully aware of the following sections of the Honor Code: Extent of the Honor Code, Responsibility of the Student and Penalty. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on http://universitypolicy.gmu.edu/1301gen.html web site.\"","PeriodicalId":211467,"journal":{"name":"Data Protection Law in the EU: Roles, Responsibilities and Liability","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133857997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Basic Protections","authors":"","doi":"10.1017/9781780688459.009","DOIUrl":"https://doi.org/10.1017/9781780688459.009","url":null,"abstract":"","PeriodicalId":211467,"journal":{"name":"Data Protection Law in the EU: Roles, Responsibilities and Liability","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133417382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Typology of Issues","authors":"","doi":"10.1017/9781780688459.029","DOIUrl":"https://doi.org/10.1017/9781780688459.029","url":null,"abstract":"","PeriodicalId":211467,"journal":{"name":"Data Protection Law in the EU: Roles, Responsibilities and Liability","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121108684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Structure and Methodology","authors":"M. Fortis, M. Carminati","doi":"10.1007/978-3-319-12763-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-12763-7_2","url":null,"abstract":"","PeriodicalId":211467,"journal":{"name":"Data Protection Law in the EU: Roles, Responsibilities and Liability","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"International Instruments","authors":"","doi":"10.1017/9781780688459.018","DOIUrl":"https://doi.org/10.1017/9781780688459.018","url":null,"abstract":"","PeriodicalId":211467,"journal":{"name":"Data Protection Law in the EU: Roles, Responsibilities and Liability","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131951293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Jeyaraj, Sonam Vadera, Z. Low, L. Gluud, M. Morgan
{"title":"Background","authors":"R. Jeyaraj, Sonam Vadera, Z. Low, L. Gluud, M. Morgan","doi":"10.1017/9781780688459.003","DOIUrl":"https://doi.org/10.1017/9781780688459.003","url":null,"abstract":"The EASL/AASLD guidelines stipulate that both neomycin and metronidazole may be used as alternatives for the treatment of overt HE, whereas the Italian guidelines state that these antibiotics are currently not recommended, mainly because of their potential systemic toxicity. This study aims to evaluate the utility of aminoglycosides and metronidazole vs. placebo, non-absorbable disaccharides (NAD) and other active treatment, for the management of HE in adults with cirrhosis","PeriodicalId":211467,"journal":{"name":"Data Protection Law in the EU: Roles, Responsibilities and Liability","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126298889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Social Networks","authors":"Jeong-ha Oh, Anjana Susarla, Yong Tan","doi":"10.1787/29c36907-en","DOIUrl":"https://doi.org/10.1787/29c36907-en","url":null,"abstract":"This paper is motivated by the success of You Tube, which is attractive to content creators and media companies for the potential to rapidly disseminate digital content. The tremendous variation in the success of videos posted online and the networked structure of interactions on You Tube lend itself to an inquiry about the role of social influence on content diffusion. Using a unique data set of video information and user information collected from You Tube, we find that evidence for a number of mechanisms by which social influence is transmitted, such as a preference for conformity, social learning and the role of innovators or opinion-makers. Such mechanisms of social interactions can play a huge role not only in the success of user-generated content, but also on the magnitude of that impact. Our results are in sharp contrast to earlier models of diffusion such as the Bass model that do not distinguish between different social processes that are responsible for the process of diffusion of content. Econometrically, the problem in identifying social influence is that individuals’ choices depend in great part on the choices of other individuals, referred to as the ‘reflection problem’. Another problem in identification is to distinguish between social contagion and user heterogeneity in the diffusion process. Our results are robust to potential self-selection according to user tastes, temporal heterogeneity and the reflection problem. Implications for researchers and managers are discussed.","PeriodicalId":211467,"journal":{"name":"Data Protection Law in the EU: Roles, Responsibilities and Liability","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114025216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Liability Exposure of Controllers and Processors","authors":"B. Alsenoy","doi":"10.1017/9781780688459.011","DOIUrl":"https://doi.org/10.1017/9781780688459.011","url":null,"abstract":"145. OUTLINE – The GDPR has introduced a number of important clarifications and changes when it comes to liability under EU data protection law. The main principles underlying the liability model have, however, essentially remained the same. To provide a comprehensive account of the liability exposure of controllers and processors, both the liability regime of Directive 95/46 and the liability regime GDPR shall be analysed. 146. RELEVANT SOURCES – The main sources used for the analysis are the texts of Directive 95/46 and the GDPR, their preparatory works and the guidance issued by the Article 29 Working Party. Where appropriate, however, reference shall also be made to the preparatory works of national implementations of Directive 95/46 (e.g. the Netherlands, Belgium), as a means to supplement the insights offered by the primary sources. Last but not least, the Principles of European Tort Law (PETL), as well as national tort law, are also considered for issues not addressed explicitly by Directive 95/46 or the GDPR. DIRECTIVE 95/46: “STRICT” LIABILITY FOR CONTROLLERS 147. BASIC PRINCIPLE – Under Directive 95/46, a controller was, as a matter of principle, liable for any damages caused by the unlawful processing of personal data. Article 23(1) of Directive 95/46 stipulates that Member States must provide that the controller shall be liable towards data subjects for any damages suffered as a result of an unlawful processing operation. A controller could be exempted from liability, however, in whole or in part, if he proved that he was “ not responsible for the event giving rise to the damage ” (Article 23(2)). Directive 95/46 does not contain any provisions regarding the liability exposure of processors. While Article 16 stipulates that processors may only process the data in accordance with the instructions of the controller, the Directive does not explicitly allocate liability in case of a disregard for instructions. CONTROLLER LIABILITY A. The nature of controller obligations 148. “MEANS” OR “RESULT” – To properly understand the liability exposure of controllers, it is necessary to first understand the nature of controller obligations. Directive 95/46 imposes a variety of obligations upon controllers. In certain instances, the obligations specify a result to be achieved (e.g. “personal data must be collected for legitimate purposes and not further processed in a way incompatible with those purposes”). In other instances, the obligations are specified as an obligation to make reasonable eff orts to do something (“obligation of means”).","PeriodicalId":211467,"journal":{"name":"Data Protection Law in the EU: Roles, Responsibilities and Liability","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126693075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}