37 research outputs found

    Business requirements for legal knowledge graph : the LYNX platform

    Get PDF
    Proceedings of the 2nd Workshop on Technologies for Regulatory Compliance co-located with the 31st International Conference on Legal Knowledge and Information Systems (JURIX 2018). Groningen, The Netherlands, December 12, 2018.European small and medium-size enterprises (SMEs) and large corporations face multiple constraints to engage in trade abroad and to localize their products and services to other countries, mainly as a consequence of legal and language barriers. This is one of the main consequences of the multiple differences across Europe, which is fragmented into legal silos and into more than 20 linguistic islands. LYNX H2020 project will provide more effective ways of accessing huge amount of digital regulatory compliance documents, including legislation, case law, standards, industry norms and best practices. In particular, the LYNX project envisages an ecosystem of smart cloud services to better manage compliance documents, based on a Legal Knowledge Graph (LKG) which integrates and links heterogeneous compliance data sources. This ecosystem will enable smart search, smart assistance and smart referencing of case law, as well as Artificial Intelligence technologies and machine translation of regulatory compliance documents. An initial step in the development of the LYNX platform is the collection of business requirements from end-users and relevant stakeholders. Therefore, this work introduces the techniques used for the gathering of business requirements from endusers and stakeholders and a list of prioritized business requirements collected through qualitative and quantitative techniques

    Legal compliance by design (LCbD) and through design (LCtD) : preliminary survey

    Get PDF
    1st Workshop on Technologies for Regulatory Compliance co-located with the 30th International Conference on Legal Knowledge and Information Systems (JURIX 2017). The purpose of this paper is twofold: (i) carrying out a preliminary survey of the literature and research projects on Compliance by Design (CbD); and (ii) clarifying the double process of (a) extending business managing techniques to other regulatory fields, and (b) converging trends in legal theory, legal technology and Artificial Intelligence. The paper highlights the connections and differences we found across different domains and proposals. We distinguish three different policydriven types of CbD: (i) business, (ii) regulatory, (iii) and legal. The recent deployment of ethical views, and the implementation of general principles of privacy and data protection lead to the conclusion that, in order to appropriately define legal compliance, Compliance through Design (CtD) should be differentiated from CbD

    A Catalan code of best practices for the audiovisual sector

    Get PDF
    In spite of a new general law regarding Audiovisual Communication, the regulatory framework of the audiovisual sector in Spain can still be defined as huge, disperse and obsolete. The first part of this paper provides an overview of the major challenges of the Spanish audiovisual sector as a result of the convergence of platforms, services and operators, paying especial attention to the Audiovisual Sector in Catalonia. In the second part, we will present an example of self-regulation through the previous research work done for the future Code of Best Professional Practices of the Catalan Audiovisual Union. Some issues regarding protection of minors and youth, privacy, general public right of access to digital content on line,intellectual property, pluralism, harm and offence content are examined in the light of self-regulation instruments

    Minimisation of incidental findings, and residual risks for security compliance : the SPIRIT project

    Get PDF
    This paper introduces the policy for minimisation of incidental findings and residual risks of the SPIRIT Project. SPIRIT is a EU H2020 Security project, aimed at browsing relevant sources, including the socalled "dark web". It proposes a semantically rich sense-making set of tools aimed at detecting identity fraud patterns. It provides "Technologies for prevention, investigation, and mitigation in the context of fight against crime and terrorism" for the use of LEAs in Europe. According to GDPR, some protections must be put in place. We explain how we planned and designed them. Specifically, we turned incidental findings into an incidental risks policy, planned a risk mitigation strategy (ongoing privacy preserving algorithm development), and set a dynamic DPIA

    Legal multimedia management and semantic annotation for improved search and retrieval

    Get PDF
    In this work, we study the possibilities of multimedia management and automatic annotation focused on legal domain. In this field,professionals are used to consume the most part of their time searching and retrieving legal information. For instance, in scenarios as e-discovery and e-learning search and retrieval of the multimedia contents are the basis of the whole applications. In addition, the legal multimedia explosion increases the need of Store these files in a structured form to facilitate the access to this information in an efficient and effective way. Furthermore, the improvements achieved by sensors and video recorders in the last years increase the size of these files, producing an enormous demand of storage capability.JPEG2000 and MPEG-7 are international standards by the ISO/IEC organization that allow to reduce, in some degrees, the amount of data needed to store these files. These standards also permit to include the semantic annotation in the considered file formats, and to access to this information without the need to decompress the contained vídeo or image. How to obtain the semantic information from multimèdia is also studied as well as the different techniques to exploit and combine this information

    Fighting organized crime through open source intelligence: regulatory strategies of the CAPER Project

    Get PDF
    OSINT stands for Open Source Intelligence. The CAPER project has built an OSINT solution oriented to the prevention of organised crime. We offer in this paper an overall view of some results, embedding into the system legal and ethical issues raised by the General Data Reform Package (GDRP) in Europe. We briefly describe CAPER architecture, workflow, functionalities, modules and ontologies (European LEAs Interoperability ELIO, and Multi-Lingual Crime Ontology MCO). This paper is focused on the indirect strategy to flesh out Privacy by Design principles (PbD) through the Caper Regulatory Model (CRM)

    Assessing mammal trapping standards in wild boar drop-net capture

    Get PDF
    Applying contemporary trapping standards when managing wildlife should no longer be an option, but a duty. Increasing wild boar populations originate a growing number of conflicts and hunting is the only cost-effective management option in most cases. However, new scenarios where hunting is unfeasible emerge and trapping necessities cope with lacking regulatory frameworks and technical guidelines. In this research, we evaluated drop nets, a capture method not considered by the international trapping standards, to capture Eurasian wild boar (Sus scrofa), a wildlife species not included in the list of mammal species under the scope of the Agreement on International Humane Trapping Standards (AIHTS). Less than 20% of the captured wild boars presented moderate or severe injuries attributable to the capture method, hence fulfilling the acceptance thresholds of the outdated AIHTS. Based on the new standards thresholds of acceptance, the humaneness of drop-nets in our study ranged 66-78%, under the 85% required. The capture success and selectivity were 100%, as ensured by operator-driven triggering, which should be considered the main strengths of this method, together with the minimization of animal suffering owing the short duration of the stressful situation. Additionally, in spite of the socially adverse environment, with people contrary to wild boar removal, no disturbances against the capture system or operations occurred. This is the first assessment of a drop-net capture method according to internationally accepted mammal trapping standards, with unconclusive results. However, there is a need for adapted procedures and thresholds of acceptance aimed at not-mechanical traps in general, and specifically at drop-nets. Compared to other live-capture methods, drop-nets minimize the duration of the stressful situation -at the expense of a strong adrenergic acute response-, maximize the probabilities of capturing entire sounders of prosocial species, which may be also considered as more humane, and has the ability to coordinate higher values of capture success, absolute selectivity and adaptability to difficult environments

    Automatic, efficient and scalable provenance registration for FAIR HPC workflows

    Get PDF
    Provenance registration is becoming more and more important, as we increase the size and number of experiments performed using computers. In particular, when provenance is recorded in HPC environments, it must be efficient and scalable. In this paper, we propose a provenance registration method for scientific workflows, efficient enough to run in supercomputers (thus, it could run in other environments with more relaxed restrictions, such as distributed ones). It also must be scalable in order to deal with large workflows, that are more typically used in HPC. We also target transparency for the user, shielding them from having to specify how provenance must be recorded. We implement our design using the COMPSs programming model as a Workflow Management System (WfMS) and use RO-Crate as a well-established specification to record and publish provenance. Experiments are provided, demonstrating the run time efficiency and scalability of our solution.This work has been supported by the Spanish Government (PID2019-107255GB-C21), by Generalitat de Catalunya (contract 2017-SGR-01414) and the EU’s Horizon research and innovation programme under Grant agreement No 101058129 (DT-GEO). Also, it has been contributed in the CECH project, co-funded with 50% by the European Regional Development Fund under the framework of the ERFD Operative Programme for Catalunya 2014-2020, with a grant of 1.527.637,88 C. LRN, JMF and SCG are partly supported by INB Grant (PT17/0009/0001 - ISCIII-SGEFI / ERDF), and their work received funding from the EU’s Horizon 2020 research and innovation programme under grant agreements EOSC-Life No 824087, and EJP RD No 825575.Peer ReviewedPostprint (author's final draft

    Tumores pardos en paciente con hiperparatiroidismo secundario en hemodiálisis. Presentación de caso

    Get PDF
    Introducción: los tumores pardos son raras lesiones focales óseas de células gigantes que se presentan en el curso de hiperparatiroidismo primario, secundario o terciario como expresión de osteitis fibrosa quística. Los tumores pardos suelen ser confundidos con lesiones óseas malignas. Objetivo: describir el caso de una paciente bajo tratamiento de hemodiálisis, quien presenta tumores pardos en relación con hiperparatiroidismo secundario. Presentación de caso: describimos el caso de una paciente de 60 años bajo tratamiento de hemodiálisis con hiperparatiroidismo secundario, la que presenta radiológicamente lesiones osteolíticas en huesos largos, costillas y clavículas, diagnosticadas como tumores pardos. Múltiples calcificaciones vasculares fueron observadas. Conclusiones: esta manifestación de hiperparatiroidismo secundario se observa al incrementarse la longevidad de los pacientes con fallo renal. Una completa evaluación del paciente puede ayudar a un correcto diagnóstico.Palabras clave: tumores pardos, tumores de células gigantes, osteitis fibrosa quística, hiperparatiroidismo, hiperparatiroidismo secundario, hemodiálisis.ABSTRACTIntroduction: brown tumors are rare focal giant cell lesions of the bone, are expression of osteitisfibrosacystica due to primary, secondary, or tertiary hyperparathyroidism. It is well recognized that these brown tumours can be mistaken for malignancy. Objetive: to describe a case of a patient under hemodialysis treatment with Brown tumours due to secondary hyperparathyroidism. Case Presentation: we describe a 60-year-old female hemodialysis patient with secondary hyperparathyroidism in whom osteolithic lesions in long bones, ribs and clavicle were radiologically suspected to be brown tumor. Multiple vascular calcifications were also seen. Conclusions: this manifestation of secondary hyperparathyroidism can be expected to occur with increased longevity of patients with renal failure.  A complete evaluation can help to reach a correct diagnosis. Key words: Brown tumour, giant cells tumour, osteitisfibrosacystica, hyperparathyroidism, secondary hyperparathyroidism, hemodialysis. Normal 0 false false false EN-CA X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} <![endif]--

    D8.6 OPTIMAI commercialization and exploitation strategy

    Get PDF
    Deliverable D8.6 OPTIMAI commercialization and exploitation strategy 1 st version is the first version of the OPTIMAI Exploitation Plan. Exploitation aims at ensuring that OPTIMAI becomes sustainable well after the conclusion of the research project period so as to create impact. OPTIMAI intends to develop an industry environment that will optimize production, reducing production line scrap and production time, as well as improving the quality of the products through the use of a variety of technological solutions, such as Smart Instrumentation of sensors network at the shop floor, Metrology, Artificial Intelligence (AI), Digital Twins, Blockchain, and Decision Support via Augmented Reality (AR) interfaces. The innovative aspects: Decision Support Framework for Timely Notifications, Secure and adaptive multi-sensorial network and fog computing framework, Blockchain-enabled ecosystem for securing data exchange, Intelligent Marketplace for AI sharing and scrap re-use, Digital Twin for Simulation and Forecasting, Embedded Cybersecurity for IoT services, On-the-fly reconfiguration of production equipment allows businesses to reconsider quality management to eliminate faults, increase productivity, and reduce scrap. The OPTIMAI exploitation strategy has been drafted and it consists of three phases: Initial Phase, Mid Phase and Final Phase where different activities are carried out. The aim of the Initial phase (M1 to M12), reported in this deliverable, is to have an initial results' definition for OPTIMAI and the setup of the structures to be used during the project lifecycle. In this phase, also each partner's Individual Exploitation commitments and intentions are drafted, and a first analysis of the joint exploitation strategies is being presented. The next steps, leveraging on the outcomes of the preliminary market analysis, will be to update the Key Exploitable Results with a focus on their market value and business potential and to consolidate the IPR Assessment and set up a concrete Exploitation Plan. The result of the next period of activities will be reported in D8.7 OPTIMAI commercialization and exploitation strategy - 2nd version due at month 18 (June 2022
    corecore