189 resultados para privacy policies
Resumo:
This study applied the affect heuristic model to investigate key psychological factors (affective associations, perceived benefits, and costs of wood heating) contributing to public support for three distinct types of wood smoke mitigation policies: education, incentives, and regulation. The sample comprised 265 residents of Armidale, an Australian regional community adversely affected by winter wood smoke pollution. Our results indicate that residents with stronger positive affective associations with wood heating expressed less support for wood smoke mitigation policies involving regulation. This relationship was fully mediated by expected benefits and costs associated with wood heating. Affective associations were unrelated to public support for policies involving education and incentives, which were broadly endorsed by all segments of the community, and were more strongly associated with rational considerations. Latent profile analysis revealed no evidence to support the proposition that some community members experience internal “heart versus head” conflicts in which their positive affective associations with wood heating would be at odds with their risk judgments about the dangers of wood smoke pollution. Affective associations and cost/benefit judgments were very consistent with each other.
Resumo:
This thesis examines perceptions of advertising on social networking sites (SNS), in particular consumers' privacy concerns, advertising engagement and advertising avoidance. It contributes to the understanding of social media by providing results of a longitudinal investigation of consumer perceptions of advertising, a topography of engagement and avoidance triggers and a three dimensional model of advertising avoidance on SNS. This research used a mixed methodology, employing Critical Incident Technique, In-depth interviews and online surveys.
Resumo:
A home embodies a sensorial space that is layered with personal memories and traces of history. The success of a home in providing a strong sense of place depends on various factors such as geographical location, climatic conditions, and occupants’ world-views and perceptions. This paper explores Muslims’ perceptions of privacy, modesty and hospitality within their homes through their lived experiences. This case study focuses on three Muslim families living in Australian designed homes within the same suburb of Brisbane, Australia. The study provides prefatory insight into the ways in which these families perform their daily activities and entertain their guests without jeopardizing their privacy needs. The study examines the significance of modesty in the design of Muslim homes as a means by which family members are able to achieve optimum privacy while simultaneously extending hospitality to guests inside and outside their homes. The findings of this study provide opportunities too, for expanding research into culturally adaptable housing systems to help meet the changing needs of Australian multicultural society.
Resumo:
A new era of visible and sharable electricity information is emerging. Where eco-feedback is installed, households can now visualise many aspects of their energy consumption and share this information with others through Internet platforms such as social media. Despite providing users with many affordances, eco-feedback information can make public previously private actions from within the intimate setting of the family home. This paper represents a study focussing specifically on the privacy aspects of nascent ways for viewing and sharing this new stream of personal information. It explores the nuances of privacy related to eco-feedback both within and beyond the family home. While electricity consumption information may not be considered private itself, the household practices which eco-feedback systems makes visible may be private. We show that breaches of privacy can occur in unexpected ways and have the potential to cause distress. The paper concludes with some suggestions for how to realise the benefits of sharing energy consumption information whist effectively maintaining individuals’ conceptions of adequate privacy.
Resumo:
This study provides proposed core elements of social media policy that specifically designed for academic libraries.Evaluation of social media policies from five organisations and a review of the literature were used for data collection.There are 15 proposed core elements recommended: policy objectives; policy definition; scope of the policy;university’s vision and mission; policy users; disclaimer; confidentiality; copyright; privacy; workflow; publicinformation; the use of professional language; the accuracy of the information; rule for links; and university andlibrary’s voices. The results of this study provide important aspects in the development of social media policy. Theproposed core elements of the social media policy discussed in this paper is specifically designed for the academiclibraries, but can also be used for other library types. Kajian ini memuat usulan kerangka kebijakan penggunaan media sosial dari elemen-elemen inti yang disusun khusus untuk perpustakaan perguruan tinggi. Evaluasi kebijakan penggunaan media sosial dari lima organisasi dan kajian literatur digunakan untuk pengumpulan data. Ada 15 elemen inti kebijakan yang diusulkan, yaitu: tujuan kebijakan; definisi kebijakan; lingkup kebijakan; visi dan misi universitas; sasaran pengguna kebijakan; disclaimer; kerahasiaan; hak cipta; privasi; alur kerja; informasi publik; penggunaan bahasa professional; keakuratan informasi; kaidah tautan; serta suara universitas dan perpustakaan. Hasil kajian ini menyediakan aspek penting dalam pengembangan kebijakan penggunaan media sosial. Usulan elemen inti kebijakan yang diusulkan dalam kajian ini secara khusus dirancang untuk perpustakaan perguruan tinggi, tetapi dapat juga digunakan untuk perpustakaan jenis lainnya.
Resumo:
Traditional Islamic teachings and traditions involve guidelines that have direct applications in the domestic sphere. The principles of privacy, modesty, and hospitality are central to these guidelines; each principle has a significant effect on the design of Muslim homes, as well as on the organization of space and domestic behaviors within each home. This paper reviews literature on the privacy, modesty, and hospitality within Muslim homes. Nineteen publications from 1986 to 2013 were selected and analyzed for content related to the meaning of privacy, modesty, and hospitality in Islam and the design of Muslim homes. Despite the commonly shared guidelines for observing privacy, modesty, and hospitality within each home, Muslims living in different countries are influenced by cultural factors that operate within their country of residence. These factors help to shape the architectural styles and use of space within Muslim homes in different ways. Awareness of the multifactorial nature of the influences on the Muslim perception of home and the use of space is necessary for architects, building designers, engineers, and builders to be properly equipped to meet the needs of clients.
Resumo:
The use of camera traps in wildlife management is an increasingly common practice. A phenomenon which is also becoming more common is for such camera traps to unintentionally film individuals engaged in a variety of activities, ranging from the innocent to the nefarious and including lewd or potentially embarrassing behaviour. It is therefore possible for the use of camera traps to accidentally encroach upon the privacy rights of persons who venture into the area of surveillance. In this chapter we describe the legal framework of privacy in Australia and discuss the potential risk of this sleeping tiger for users of camera traps. We also present the results of a survey of camera trap users to assess the frequency of such unintended captures and the nature of activity being filmed before discussing the practical implications of these laws for camera traps users in this country and make recommendations.
Resumo:
Purpose The purpose of this paper is to examine equal employment policies in Australia’s male-dominated construction industry and categorise the types of activities undertaken against an equal employment typology to identify links to outcomes for women in the form of increased participation and management. Design/methodology/approach To explore the issue of low representation of women in construction through the content analysis of 83 construction organisations’ equal employment opportunity (EEO) reports. Findings This industry is not engaging with equal employment issues and the numbers of women working in the industry and/or management are based on individual decision rather than an institutional commitment to equality in diversity. Research limitations/implications Australian legislation mandates organisational reporting of relevant data and offers public access to this information offering a unique data set. Practical implications An ageing population means that the predominately older male workforce is leaving construction in greater numbers with fewer potential replacements making new labour markets a vital consideration. Social implications Legislation and organisational policies designed to promote EEO for women have existed in numerous countries for decades. One objective of this legislation was to reduce male domination in senior positions and industries/occupations where women were under-represented. Despite this, few women are employed in construction in operational or management roles worldwide. Originality/value This study offers a comprehensive analysis of a male-dominated industry in one jurisdiction rather than a few selected cases and uses a broader rigorous typology for analysis that acknowledges both equal and different treatment options.
Resumo:
The New South Wales (NSW) Centre for Road Safety (CRS) called for research services to conduct a review of international policy and practice to address drug-driving. The project sought to provide Transport for NSW (TfNSW) with a comprehensive review of current and emerging international practices in this area1. This report is submitted by the Centre for Accident Research and Road Safety – Queensland (CARRS-Q)...
Resumo:
The National Quality Framework (NQF) for Early Childhood Education and Care (ECEC) in Australia identifies the need for services to make provision for each child’s sleep, rest and relaxation within a national early year’s policy framework that also requires that opportunities for learning and physical health are optimised, and that the agency of each child and their family is respected. Against this background, the scheduling of a standard sleep-time in ECEC centres remains a common practice, even in rooms catering for older children for whom daytime sleep may no longer be necessary. This article draws upon existing scholarship to explore the issues and tensions associated with sleep-rest, in the context of Australian curriculum and quality standards documents. We review accounts from educators, parents and children and contemporary views regarding high quality practice in ECEC, with an aim of supporting critical reflection on practice and continuous quality improvement in ECEC.
Resumo:
This thesis considers whether the Australian Privacy Commissioner's use of its powers supports compliance with the requirement to 'take reasonable steps' to protect personal information in National Privacy Principle 4 of the Privacy Act 1988 (Cth). Two unique lenses were used. First, the Commissioner's use of powers was assessed against the principles of transparency, balance and vigorousness and secondly against alignment with an industry practice approach to securing information. Following a comprehensive review of publicly available materials, interviews and investigation file records, this thesis found that the Commissioner's use of his powers has not been transparent, balanced or vigorous, nor has it been supportive of an industry practice approach to securing data. Accordingly, it concludes that the Privacy Commissioner's use of its regulatory powers is unlikely to result in any significant improvement to the security of personal information held by organisations in Australia.
Resumo:
Suppose a homeowner habitually enjoys sunbathing in his or her backyard, protected by a high fence from prying eyes, including those of an adolescent neighbour. In times past such homeowners could be assured that they might go about their activities without a threat to their privacy. However, recent years have seen technological advances in the development of unmanned aerial vehicles (‘UAVs’), also known colloquially as drones, that have allowed them to become more reduced in size, complexity and price. UAVs today include models retailing to the public for less than $350 and with an ease of operation that enables them to serve as mobile platforms for miniature cameras. These machines now mean that for individuals like the posited homeowner’s adolescent neighbour, barriers such as high fences no longer constitute insuperable obstacles to their voyeuristic endeavours. Moreover, ease of access to the internet and video sharing websites provides a ready means of sharing any recordings made with such cameras with a wide audience. Persons in the homeowner’s position might understandably seek some form of redress for such egregious invasions of their privacy. Other than some kind of self-help, what alternative measures may be available?
Resumo:
XACML has become the defacto standard for enterprise- wide, policy-based access control. It is a structured, extensible language that can express and enforce complex access control policies. There have been several efforts to extend XACML to support specific authorisation models, such as the OASIS RBAC profile to support Role Based Access Control. A number of proposals for authorisation models that support business processes and workflow systems have also appeared in the literature. However, there is no published work describing an extension to allow XACML to be used as a policy language with these models. This paper analyses the specific requirements of a policy language to express and enforce business process authorisation policies. It then introduces BP-XACML, a new profile that extends the RBAC profile for XACML so it can support business process authorisation policies. In particular, BP-XACML supports the notion of tasks, and constraints at the level of a task instance, which are important requirements in enforcing business process authorisation policies.