In compliance with the Canadian Privacy Legislation

نویسنده

  • MICHAEL ECKERT
چکیده

Long-term potentiation (LTP) and depression (LTD) are activity-dependent changes in synaptic strength that model how the brain might store memories. The mechanisms of LTP and LTD have been studied extensively in the hippocampus because the hippocampus is critical for memory storage. The neocortex is also believed to be critical for the long-term storage of memories, but less work on LTP and LTD has been done in the neocortex. Furthermore, the majority of neocortical LTP and LTD studies have been carried out in artifical brain-slice preparations. The experiments presented in this thesis test some mechanisms of LTP and LTD in the neocortex of the awake, freely behaving rat. In the hippocampus and anesthetized neocortex, simultaneous stimulation of a 'strong' and a 'weak' input pathway can induce LTP in the weak pathway (even though stimulation of the weak pathway alone does not induce LTP). However, the results presented here show that in the neocortex of awake, freely behaving animals, simultaneous activation of strong and weak input pathways does not induce LTP in the weak pathway. In fact, under these conditions, an LTD is induced in the weak pathway. However, under these conditions, LTP induction was facilitated in the strong pathway. Associative LTD has also been shown in the hippocampus following anticorrelated activity delivered to two input pathways. The associative LTD in the hippocampus is larger than either homosynaptic or heterosynaptic LTD. The results presented here

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping 'Security Safeguard' Requirements in a data privacy legislation to an international privacy framework: A compliance methodology

It is commonplace for organisations to collect personal information to be processed and stored on their systems. Until recently, there was no comprehensive legislation that addressed the ‘processing’ of personal information by organisations in South Africa. The Protection of Personal Information Bill (“POPI”) was signed into law in November 2013 and is expected to come into effect, later this y...

متن کامل

A Requirements Management Framework for Privacy Compliance

Compliance with privacy legislation is a primary concern for health care institutions that are building information systems support for their business processes. This paper describes a requirements management framework that enables health information custodians (HIC) to document and track compliance with privacy legislation. A metamodel is defined for our framework to define compliance tracking...

متن کامل

Personal health information in Canada: A comparison of citizen expectations and legislation

This paper explores whether the Canadian legislative protections in place to safeguard medical privacy meet the expectations of Canadians. An overview of current governance systems designed to protect the privacy of personal health information at both the federal and provincial levels is first presented. This is followed by an empirical analysis of the results of a public opinion survey conduct...

متن کامل

Framework for Assessing Privacy of Internet Applications

This paper presents a new framework for assessing and documenting the privacy risks associated with developing and managing internet applications. The Framework for Assessing Privacy of Internet Applications (FAPIA) provides a tool to aid the analysis of privacy risks and a structured means of analyzing the risks and documenting a control systems to ensure compliance with data protection and pr...

متن کامل

Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation

Extending Requirements Engineering modelling and formal analysis methodologies to cope with Security Requirements has been a major effort in the past decade. Yet, only few works describe complex case studies that show the ability of the informal and formal approaches to cope with the level complexity required by compliance with ISO-17799 security management requirements. In this paper we presen...

متن کامل

Privacy Compliance Checking using a Model-Based Approach

In order to conduct business, organizations must try to assess and ensure compliance with privacy legislation, policies and regulations, as part of their IT governance initiatives. As well as these ‘data protection’ concerns, there may be an intangible value in proposing an ‘open’ approach to privacy compliance, for example by showing all privacy-relevant information as is done within the Googl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004