441 resultados para privacy violations


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mandatory data breach notification has become a matter of increasing concern for law reformers. In Australia, this issue was recently addressed as part of a comprehensive review of privacy law conducted by the Australian Law Reform Commission (ALRC) which recommended a uniform national regime for protecting personal information applicable to both the public and private sectors. As in all federal systems, the distribution of powers between central and state governments poses problems for national consistency. In the authors’ view, a uniform approach to mandatory data breach notification has greater merit than a ‘jurisdiction specific’ approach epitomized by US state-based laws. The US response has given rise to unnecessary overlaps and inefficiencies as demonstrated by a review of different notification triggers and encryption safe harbors. Reviewing the US response, the authors conclude that a uniform approach to data breach notification is inherently more efficient.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Digital Economy Bill has been heavily criticized by consumer organizations, internet service providers and technology experts on the grounds that it will reduce the public’s ability to access politically sensitive information, impinge on citizens’ rights to privacy, threaten freedom of expression and have a chilling effect on digital innovation. Its passage in spite of these criticisms reflects, among other things, the power of the rhetoric that has been employed by its proponents. This paper examines economic arguments surrounding the digital economy debate in light of lessons from one of the world's fastest growing economies: China.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Before making a security or privacy decision, Internet users should evaluate several security indicators in their browser, such as the use of HTTPS (indicated via the lock icon), the domain name of the site, and information from extended validation certificates. However, studies have shown that human subjects infrequently employ these indicators, relying on other indicators that can be spoofed and convey no cryptographic assurances. We identify four simple security indicators that accurately represent security properties of the connection and then examine 125 popular websites to determine if the sites' designs result in correctly displayed security indicators during login. In the vast majority of cases, at least some security indicators are absent or suboptimal. This suggests users are becoming habituated to ignoring recommended security indicators.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe the introduction, service growth, benefits and holistic support approach of a centrally supported universitywide online survey tool for researchers at QUT. The online survey service employs the Key Survey software, and has grown into a significant service for QUT researchers since being introduced in 2009. Key benefits of the approach include the ability of QUT to handle important issues relating to data such as security, privacy, integrity, archiving & disposal. The service also incorporates a workflow process that enhances the institution’s ability to ensure survey quality control through controlled approval and pilot testing before any survey is widely released. An important issue is that a tool like this can make it very easy to do very poor research very quickly while creating lots of data, due to the absence of a rigorous methodology designed to reduce errors and collect accurate, comprehensive, timely data. With this in mind, a holistic approach to service provision and support has been taken, which has included the introduction of an integrated system of seminars, tools and workshops to get researchers thinking about the quality of their research while becoming operational quickly. The system of seminars, workshops, checks and approvals we have put in place at QUT is designed to ensure better quality outcomes for QUT’s research and the individual researchers concerned.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Level crossing crashes have been shown to result in enormous human and financial cost to society. According to the Australian Transport Safety Bureau (ATSB) [5] a total of 632 Railway Level crossing (RLX) collisions, between trains and road vehicles, occurred in Australia between 2001 and June 2009. The cost of RLX collisions runs into the tens of millions of dollars each year in Australia [6]. In addition, loss of life and injury are commonplace in instances where collisions occur. Based on estimates that 40% of rail related fatalities occur at level crossings [12], it is estimated that 142 deaths between 2001 and June 2009 occurred at RLX. The aim of this paper is to (i) summarise crash patterns in Australia, (ii) review existing international ITS interventions to improve level crossing and (iii) highlights open human factors research related issues. Human factors (e.g., driver error, lapses or violations) have been evidenced as a significant contributing factor in RLX collisions, with drivers of road vehicles particularly responsible for many collisions. Unintentional errors have been found to contribute to 46% of RLX collisions [6] and appear to be far more commonplace than deliberate violations. Humans have been found to be inherently inadequate at using the sensory information available to them to facilitate safe decision-making at RLX and tend to underestimate the speed of approaching large objects due to the non-linear increases in perceived size [6]. Collisions resulting from misjudgements of train approach speed and distance are common [20]. Thus, a fundamental goal for improved RLX safety is the provision of sufficient contextual information to road vehicle drivers to facilitate safe decision-making regarding crossing behaviours.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Delegation, from the technical point of view, is widely considered as a potential approach in addressing the problem of providing dynamic access control decisions in activities with a high level of collaboration, either within a single security domain or across multiple security domains. Although delegation continues to attract significant attention from the research community, presently, there is no published work that presents a taxonomy of delegation concepts and models. This paper intends to address this gap by presenting a set of taxonomic criteria relevant to the concept of delegation and applies the taxonomy to a selection of significant delegation models published in the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The term ‘driving self-restriction’ is used in the road safety literature to describe the behaviour of some older drivers. It includes the notion that older drivers will avoid driving in specific, usually self-identified situations, such as those in which safety is compromised. We sought to identify the situations that older drivers report avoiding; and, to determine the adequacy of a key measure of such behaviour. A sample of 75 drivers aged 65 years and older completed Baldock et al.’s modification of the Driving Habits Questionnaire avoidance items (Baldock et al., 2006), the Driving Behaviour Questionnaire, and open-ended items that elicited written descriptions of the most and least safe driving situation. Consistent with previous results, we found a relatively low level of driving self-restriction and infrequent episodes of aggressive violations. However, when combined with the situation descriptions, these data suggest that Driving Habits Questionnaire did not cover all of the situations that older drivers might choose avoid. We suggest that a new avoidance scale is needed and we present a new item pool that may be used for this purpose.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The launch of the Apple iPad on January 2010 has seen considerable interest from the newspaper and publishing industry in developing content and business models for the tablet PC device that can address the limits of both the print and online news and information media products. It is early days in the iPad’s evolution, and we wait to see what competitor devices will emerge in the near future. It is apparent, however, that it has become a significant “niche” product, with considerable potential for mass market expansion over the next few years, possibly at the expense of netbook sales. The scope for the iPad and tablet PCs to become a “fourth screen” for users, alongside the TV, PC and mobile phone, is in early stages of evolution. The study used five criteria to assess iPad apps: • Content: timeliness; archive; personalisation; content depth; advertisements; the use of multimedia; and the extent to which the content was in sync with the provider brand. • Useability: degree of static content; ability to control multimedia; file size; page clutter; resolution; signposts; and customisation. • Interactivity: hyperlinks; ability to contribute content or provide feedback to news items; depth of multimedia; search function; ability to use plug-ins and linking; ability to highlight, rate and/or save items; functions that may facilitate a community of users. • Transactions capabilities: ecommerce functionality; purchase and download process; user privacy and transaction security. • Openness: degree of linking to outside sources; reader contribution processes; anonymity measures; and application code ownership.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Todoy's monogers-drowing on the expertise of their IT professiono/s-privacy, key communication and control issues, the current legal climate, and ethical issues that communication professionals need to address to forestall future problems. lA questionnaire is included as a starting point for communication professionals to assess their own attitudes and values to workplace surveillance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In May 2008, xenophobic violence erupted in South Africa. The targets were individuals who had migrated from the north in search of asylum. Emerging first in township communities around Johannesburg, the aggression spread to other provinces. Sixty-two people died, and 100,000 (20,000 in the Western Cape alone) were displaced. As the attacks escalated across the country, thousands of migrants searched for refuge in police stations and churches. Chilling stories spread about mobs armed with axes, metal bars, and clubs. The mobs stormed from shack to shack, assaulted migrants, locked them in their homes, and set the homes on fire. The public reaction was one of shock and horror. The Los Angeles Times declared, “Migrants Burned Alive in S. Africa.” The South African president at the time, Thabo Mbeki, called for an end to “shameful and criminal attacks.” Commentators were stunned by the signs of hatred of foreigners (xenophobia) that emerged in the young South African democracy. The tragedy of the violence in South Africa was magnified by the fact that many of the victims had fled from violence and persecution in their countries of origin. Amid genocidal violations of human rights that had recently occurred in some countries in sub- Saharan Africa, the new South Africa stood as a beacon of democracy and respect for human dignity. With this openness in mind, many immigrants to South Africa sought safety and refuge from the conflicts in their homelands. More than 43,500 refugees and 227,000 asylum seekers now live in South Africa. The majority of people accorded refugee status came from Burundi, Democratic Republic of Congo, and Somalia. South Africa also hosts thousands of other migrants who remain undocumented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The contribution of risky behaviour to the increased crash and fatality rates of young novice drivers is recognised in the road safety literature around the world. Exploring such risky driver behaviour has led to the development of tools like the Driver Behaviour Questionnaire (DBQ) to examine driving violations, errors, and lapses. Whilst the DBQ has been utilised in young novice driver research, some items within this tool seem specifically designed for the older, more experienced driver, whilst others appear to asses both behaviour and related motives. Therefore there is a need for a risky behaviour measurement tool that can be utilised with young drivers with a provisional (intermediate) driving licence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents findings from the rural and remote road safety study, conducted in Queensland, Australia, from March 2004 till June 2007, and compares fatal crashes and non-fatal but serious crashes in respect of their environmental, vehicle and operator factors. During the study period there were 613 non-fatal crashes resulting in 684 hospitalised casualties and 119 fatal crashes resulting in 130 fatalities. Additional information from police sources was available on 103 fatal and 309 non-fatal serious crashes. Over three quarters of both fatal and hospitalised casualties were male and the median age in both groups was 34 years. Fatal crashes were more likely to involve speed, alcohol and violations of road rules and fatal crash victims were 2 and a 1/2 times more likely to be unrestrained inside the vehicle than non-fatal casualties, consistent with current international evidence. After controlling for human factors, vehicle and road conditions made a minimal contribution to the seriousness of the crash outcome. Targeted interventions to prevent fatalities on rural and remote roads should focus on reducing speed and drink driving and promoting seatbelt wearing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Previous research has shown the association between stress and crash involvement. The impact of stress on road safety may also be mediated by behaviours including cognitive lapses, errors, and intentional traffic violations. This study aimed to provide a further understanding of the impact that stress from different sources may have upon driving behaviour and road safety. It is asserted that both stress extraneous to the driving environment and stress directly elicited by driving must be considered part of a dynamic system that may have a negative impact on driving behaviours. Two hundred and forty-seven public sector employees from Queensland, Australia, completed self-report measures examining demographics, subjective work-related stress, daily hassles, and aspects of general mental health. Additionally, the Driver Behaviour Questionnaire (DBQ) and the Driver Stress Inventory (DSI) were administered. All participants drove for work purposes regularly, however the study did not specifically focus on full-time professional drivers. Confirmatory factor analysis of the predictor variables revealed three factors: DSI negative affect; DSI risk taking; and extraneous influences (daily hassles, work-related stress, and general mental health). Moderate intercorrelations were found between each of these factors confirming the ‘spillover’ effect. That is, driver stress is reciprocally related to stress in other domains including work and domestic life. Structural equation modelling (SEM) showed that the DSI negative affect factor influenced both lapses and errors, whereas the DSI risk-taking factor was the strongest influence on violations. The SEMs also confirmed that daily hassles extraneous to the driving environment may influence DBQ lapses and violations independently. Accordingly, interventions may be developed to increase driver awareness of the dangers of excessive emotional responses to both driving events and daily hassles (e.g. driving fast to ‘blow off steam’ after an argument). They may also train more effective strategies for self-regulation of emotion and coping when encountering stressful situations on the road.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mainstream representations of trans people typically run the gamut from victim to mentally ill and are almost always articulated by non-trans voices. The era of user-generated digital content and participatory culture has heralded unprecedented opportunities for trans people who wish to speak their own stories in public spaces. Digital Storytelling, as an easy accessible autobiographic audio-visual form, offers scope to play with multi-dimensional and ambiguous representations of identity that contest mainstream assumptions of what it is to be ‘male’ or ‘female’. Also, unlike mainstream media forms, online and viral distribution of Digital Stories offer potential to reach a wide range of audiences, which is appealing to activist oriented storytellers who wish to confront social prejudices. However, with these newfound possibilities come concerns regarding visibility and privacy, especially for storytellers who are all too aware of the risks of being ‘out’ as trans. This paper explores these issues from the perspective of three trans storytellers, with reference to the Digital Stories they have created and shared online and on DVD. These examplars are contextualised with some popular and scholarly perspectives on trans representation, in particular embodied and performed identity. It is contended that trans Digital Stories, while appearing in some ways to be quite conventional, actually challenge common notions of gender identity in ways that are both radical and transformative.