441 resultados para privacy violations


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Object identification and tracking have become critical for automated on-site construction safety assessment. The primary objective of this paper is to present the development of a testbed to analyze the impact of object identification and tracking errors caused by data collection devices and algorithms used for safety assessment. The testbed models workspaces for earthmoving operations and simulates safety-related violations, including speed limit violations, access violations to dangerous areas, and close proximity violations between heavy machinery. Three different cases were analyzed based on actual earthmoving operations conducted at a limestone quarry. Using the testbed, the impacts of device and algorithm errors were investigated for safety planning purposes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an automated image‐based safety assessment method for earthmoving and surface mining activities. The literature review revealed the possible causes of accidents on earthmoving operations, investigated the spatial risk factors of these types of accident, and identified spatial data needs for automated safety assessment based on current safety regulations. Image‐based data collection devices and algorithms for safety assessment were then evaluated. Analysis methods and rules for monitoring safety violations were also discussed. The experimental results showed that the safety assessment method collected spatial data using stereo vision cameras, applied object identification and tracking algorithms, and finally utilized identified and tracked object information for safety decision making.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Regardless of technology benefits, safety planners still face difficulties explaining errors related to the use of different technologies and evaluating how the errors impact the performance of safety decision making. This paper presents a preliminary error impact analysis testbed to model object identification and tracking errors caused by image-based devices and algorithms and to analyze the impact of the errors for spatial safety assessment of earthmoving and surface mining activities. More specifically, this research designed a testbed to model workspaces for earthmoving operations, to simulate safety-related violations, and to apply different object identification and tracking errors on the data collected and processed for spatial safety assessment. Three different cases were analyzed based on actual earthmoving operations conducted at a limestone quarry. Using the testbed, the impacts of the errors were investigated for the safety planning purpose.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Health information sharing has become a vital part of modern healthcare delivery. E-health technologies provide efficient and effective ways of sharing medical information, but give rise to issues that neither the medical professional nor the consumers have control over. Information security and patient privacy are key impediments that hinder sharing information as sensitive as health information. Health information interoperability is another issue which hinders the adoption of available e health technologies. In this paper we propose a solution for these problems in terms of information accountability, the HL7 interoperability standard and social networks for manipulating personal health records.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Online social networking has become one of the most popular Internet applications in the modern era. They have given the Internet users, access to information that other Internet based applications are unable to. Although many of the popular online social networking web sites are focused towards entertainment purposes, sharing information can benefit the healthcare industry in terms of both efficiency and effectiveness. But the capability to share personal information; the factor which has made online social networks so popular, is itself a major obstacle when considering information security and privacy aspects. Healthcare can benefit from online social networking if they are implemented such that sensitive patient information can be safeguarded from ill exposure. But in an industry such as healthcare where the availability of information is crucial for better decision making, information must be made available to the appropriate parties when they require it. Hence the traditional mechanisms for information security and privacy protection may not be suitable for healthcare. In this paper we propose a solution to privacy enhancement in online healthcare social networks through the use of an information accountability mechanism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper considers the contentious space between self-affirmation and selfpreoccupation in Elizabeth Gilbert’s popular travel memoir, Eat, Pray, Love. Following the surveillance of the female confessant, the female traveller has recently come under close scrutiny and public suspicion. She is accused of walking a fine line between critical self-insight and obsessive selfimportance and her travel narratives are branded as accounts of navel gazing that are less concerned with what is seen than with who is doing the seeing. In reading these themes against the backdrop of women’s travel, the possibility arises that the culture of narcissism is increasingly read as a female discursive practice, concerned with authorship, privacy and the subjectivity of truth. The novel, which has been praised by some as ‘the ultimate guide to balanced living’ and dismissed by others as ‘self-serving junk’, poses questions about the requisites in Western culture for being a female traveller and for telling a story that focuses primarily on the self.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate known security flaws in the context of security ceremonies to gain an understanding of the ceremony analysis process. The term security ceremonies is used to describe a system of protocols and humans which interact for a specific purpose. Security ceremonies and ceremony analysis is an area of research in its infancy, and we explore the basic principles involved to better understand the issues involved.We analyse three ceremonies, HTTPS, EMV and Opera Mini, and use the information gained from the experience to establish a list of typical flaws in ceremonies. Finally, we use that list to analyse a protocol proven secure for human use. This leads to a realisation of the strengths and weaknesses of ceremony analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An initialisation process is a key component in modern stream cipher design. A well-designed initialisation process should ensure that each key-IV pair generates a different key stream. In this paper, we analyse two ciphers, A5/1 and Mixer, for which this does not happen due to state convergence. We show how the state convergence problem occurs and estimate the effective key-space in each case.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter explores some of the practical and theoretical obstacles and opportunities for self-expression experienced by a group of Queer Dig- ital Storytellers who primarily make and distribute their stories online. “Queer” in this chapter encompasses a diverse range of gender and sexual identities and perspectives on same, including the heterosexual children of queer parents and heterosexual parents of queer children. As such it is also used as a unifying moniker by participants in the Rainbow Family Tree case study that is examined in this chapter. The Digital Storytellers in this case study are largely motivated by a desire to have an impact on social attitudes towards gender and sexuality, both in their personal province of friends and family, and in public domains constituted of unknown or invisible audiences. The privacy and publicity dilemmas that will be considered arise out of positioning personal stories in the public domain and the quandaries that emerge from an activist desire to speak truth to power that is located across a wide cross section of audiences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many drivers in highly motorised countries believe that aggressive driving is increasing. While the prevalence of the behaviour is difficult to reliably identify, the consequences of on-road aggression can be severe, with extreme cases resulting in property damage, injury and even death. This research program was undertaken to explore the nature of aggressive driving from within the framework of relevant psychological theory in order to enhance our understanding of the behaviour and to inform the development of relevant interventions. To guide the research a provisional ‘working’ definition of aggressive driving was proposed encapsulating the recurrent characteristics of the behaviour cited in the literature. The definition was: “aggressive driving is any on-road behaviour adopted by a driver that is intended to cause physical or psychological harm to another road user and is associated with feelings of frustration, anger or threat”. Two main theoretical perspectives informed the program of research. The first was Shinar’s (1998) frustration-aggression model, which identifies both the person-related and situational characteristics that contribute to aggressive driving, as well as proposing that aggressive behaviours can serve either an ‘instrumental’ or ‘hostile’ function. The second main perspective was Anderson and Bushman’s (2002) General Aggression Model. In contrast to Shinar’s model, the General Aggression Model reflects a broader perspective on human aggression that facilitates a more comprehensive examination of the emotional and cognitive aspects of aggressive behaviour. Study One (n = 48) examined aggressive driving behaviour from the perspective of young drivers as an at-risk group and involved conducting six focus groups, with eight participants in each. Qualitative analyses identified multiple situational and person-related factors that contribute to on-road aggression. Consistent with human aggression theory, examination of self-reported experiences of aggressive driving identified key psychological elements and processes that are experienced during on-road aggression. Participants cited several emotions experienced during an on-road incident: annoyance, frustration, anger, threat and excitement. Findings also suggest that off-road generated stress may transfer to the on-road environment, at times having severe consequences including crash involvement. Young drivers also appeared quick to experience negative attributions about the other driver, some having additional thoughts of taking action. Additionally, the results showed little difference between males and females in the severity of behavioural responses they were prepared to adopt, although females appeared more likely to displace their negative emotions. Following the self-reported on-road incident, evidence was also found of a post-event influence, with females being more likely to experience ongoing emotional effects after the event. This finding was evidenced by ruminating thoughts or distraction from tasks. However, the impact of such a post-event influence on later behaviours or interpersonal interactions appears to be minimal. Study Two involved the quantitative analysis of n = 926 surveys completed by a wide age range of drivers from across Queensland. The study aimed to explore the relationships between the theoretical components of aggressive driving that were identified in the literature review, and refined based on the findings of Study One. Regression analyses were used to examine participant emotional, cognitive and behavioural responses to two differing on-road scenarios whilst exploring the proposed theoretical framework. A number of socio-demographic, state and trait person-related variables such as age, pre-study emotions, trait aggression and problem-solving style were found to predict the likelihood of a negative emotional response such as frustration, anger, perceived threat, negative attributions and the likelihood of adopting either an instrumental or hostile behaviour in response to Scenarios One and Two. Complex relationships were found to exist between the variables, however, they were interpretable based on the literature review findings. Factor analysis revealed evidence supporting Shinar’s (1998) dichotomous description of on-road aggressive behaviours as being instrumental or hostile. The second stage of Study Two used logistic regression to examine the factors that predicted the potentially hostile aggressive drivers (n = 88) within the sample. These drivers were those who indicated a preparedness to engage in direct acts of interpersonal aggression on the road. Young, male drivers 17–24 years of age were more likely to be classified as potentially hostile aggressive drivers. Young drivers (17–24 years) also scored significantly higher than other drivers on all subscales of the Aggression Questionnaire (Buss & Perry, 1992) and on the ‘negative problem orientation’ and ‘impulsive careless style’ subscales of the Social Problem Solving Inventory – Revised (D’Zurilla, Nezu & Maydeu-Olivares, 2002). The potentially hostile aggressive drivers were also significantly more likely to engage in speeding and drink/drug driving behaviour. With regard to the emotional, cognitive and behavioural variables examined, the potentially hostile aggressive driver group also scored significantly higher than the ‘other driver’ group on most variables examined in the proposed theoretical framework. The variables contained in the framework of aggressive driving reliably distinguished potentially hostile aggressive drivers from other drivers (Nagalkerke R2 = .39). Study Three used a case study approach to conduct an in-depth examination of the psychosocial characteristics of n = 10 (9 males and 1 female) self-confessed hostile aggressive drivers. The self-confessed hostile aggressive drivers were aged 24–55 years of age. A large proportion of these drivers reported a Year 10 education or better and average–above average incomes. As a group, the drivers reported committing a number of speeding and unlicensed driving offences in the past three years and extensive histories of violations outside of this period. Considerable evidence was also found of exposure to a range of developmental risk factors for aggression that may have contributed to the driver’s on-road expression of aggression. These drivers scored significantly higher on the Aggression Questionnaire subscales and Social Problem Solving Inventory Revised subscales, ‘negative problem orientation’ and ‘impulsive/careless style’, than the general sample of drivers included in Study Two. The hostile aggressive driver also scored significantly higher on the Barrett Impulsivity Scale – 11 (Patton, Stanford & Barratt, 1995) measure of impulsivity than a male ‘inmate’, or female ‘general psychiatric’ comparison group. Using the Carlson Psychological Survey (Carlson, 1982), the self-confessed hostile aggressive drivers scored equal or higher scores than the comparison group of incarcerated individuals on the subscale measures of chemical abuse, thought disturbance, anti-social tendencies and self-depreciation. Using the Carlson Psychological Survey personality profiles, seven participants were profiled ‘markedly anti-social’, two were profiled ‘negative-explosive’ and one was profiled as ‘self-centred’. Qualitative analysis of the ten case study self-reports of on-road hostile aggression revealed a similar range of on-road situational factors to those identified in the literature review and Study One. Six of the case studies reported off-road generated stress that they believed contributed to the episodes of aggressive driving they recalled. Intense ‘anger’ or ‘rage’ were most frequently used to describe the emotions experienced in response to the perceived provocation. Less frequently ‘excitement’ and ‘fear’ were cited as relevant emotions. Notably, five of the case studies experienced difficulty articulating their emotions, suggesting emotional difficulties. Consistent with Study Two, these drivers reported negative attributions and most had thoughts of aggressive actions they would like to take. Similarly, these drivers adopted both instrumental and hostile aggressive behaviours during the self-reported incident. Nine participants showed little or no remorse for their behaviour and these drivers also appeared to exhibit low levels of personal insight. Interestingly, few incidents were brought to the attention of the authorities. Further, examination of the person-related characteristics of these drivers indicated that they may be more likely to have come from difficult or dysfunctional backgrounds and to have a history of anti-social behaviours on and off the road. The research program has several key theoretical implications. While many of the findings supported Shinar’s (1998) frustration-aggression model, two key areas of difference emerged. Firstly, aggressive driving behaviour does not always appear to be frustration driven, but can also be driven by feelings of excitation (consistent with the tenets of the General Aggression Model). Secondly, while the findings supported a distinction being made between instrumental and hostile aggressive behaviours, the characteristics of these two types of behaviours require more examination. For example, Shinar (1998) proposes that a driver will adopt an instrumental aggressive behaviour when their progress is impeded if it allows them to achieve their immediate goals (e.g. reaching their destination as quickly as possible); whereas they will engage in hostile aggressive behaviour if their path to their goal is blocked. However, the current results question this assertion, since many of the hostile aggressive drivers studied appeared prepared to engage in hostile acts irrespective of whether their goal was blocked or not. In fact, their behaviour appeared to be characterised by a preparedness to abandon their immediate goals (even if for a short period of time) in order to express their aggression. The use of the General Aggression Model enabled an examination of the three components of the ‘present internal state’ comprising emotions, cognitions and arousal and how these influence the likelihood of a person responding aggressively to an on-road situation. This provided a detailed insight into both the cognitive and emotional aspects of aggressive driving that have important implications for the design of relevant countermeasures. For example, the findings highlighted the potential value of utilising Cognitive Behavioural Therapy with aggressive drivers, particularly the more hostile offenders. Similarly, educational efforts need to be mindful of the way that person-related factors appear to influence one’s perception of another driver’s behaviour as aggressive or benign. Those drivers with a predisposition for aggression were more likely to perceive aggression or ‘wrong doing’ in an ambiguous on-road situation and respond with instrumental and/or hostile behaviour, highlighting the importance of perceptual processes in aggressive driving behaviour.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over less than a decade, we have witnessed a seismic shift in the way knowledge is produced and exchanged. This is opening up new opportunities for civic and community engagement, entrepreneurial behaviour, sustainability initiatives and creative practices. It also has the potential to create fresh challenges in areas of privacy, cyber-security and misuse of data and personal information. The field of urban informatics focuses on the use and impacts of digital media technology in urban environments. Urban informatics is a dynamic and cross-disciplinary area of inquiry that encapsulates social media, ubiquitous computing, mobile applications and location-based services. Its insights suggest the emergence of a new economic force with the potential for driving innovation, wealth and prosperity through technological advances, digital media and online networks that affect patterns of both social and economic development. Urban informatics explores the intersections between people, place and technology, and their implications for creativity, innovation and engagement. This paper examines how the key learnings from this field can be used to position creative and cultural institutions such as galleries, libraries, archives and museums (GLAM) to take advantage of the opportunities presented by these changing social and technological developments. This paper introduces the underlying principles, concepts and research areas of urban informatics, against the backdrop of modern knowledge economies. Both theoretical ideas and empirical examples are covered in this paper. The first part discusses three challenges: a. People, and the challenge of creativity: The paper explores the opportunities and challenges of urban informatics that can lead to the design and development of new tools, methods and applications fostering participation, the democratisation of knowledge, and new creative practices. b. Technology, and the challenge of innovation: The paper examines how urban informatics can be applied to support user-led innovation with a view to promoting entrepreneurial ideas and creative industries. c. Place, and the challenge of engagement: The paper discusses the potential to establish place-based applications of urban informatics, using the example of library spaces designed to deliver community and civic engagement strategies. The discussion of these challenges is illustrated by a review of projects as examples drawn from diverse fields such as urban computing, locative media, community activism, and sustainability initiatives. The second part of the paper introduces an empirically grounded case study that responds to these three challenges: The Edge, the Queensland Government’s Digital Culture Centre which is an initiative of the State Library of Queensland to explore the nexus of technology and culture in an urban environment. The paper not only explores the new role of libraries in the knowledge economy, but also how the application of urban informatics in prototype engagement spaces such as The Edge can provide transferable insights that can inform the design and development of responsive and inclusive new library spaces elsewhere. To set the scene and background, the paper begins by drawing the bigger picture and outlining some key characteristics of the knowledge economy and the role that the creative and cultural industries play in it, grasping new opportunities that can contribute to the prosperity of Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Researchers are increasingly involved in data-intensive research projects that cut across geographic and disciplinary borders. Quality research now often involves virtual communities of researchers participating in large-scale web-based collaborations, opening their earlystage research to the research community in order to encourage broader participation and accelerate discoveries. The result of such large-scale collaborations has been the production of ever-increasing amounts of data. In short, we are in the midst of a data deluge. Accompanying these developments has been a growing recognition that if the benefits of enhanced access to research are to be realised, it will be necessary to develop the systems and services that enable data to be managed and secured. It has also become apparent that to achieve seamless access to data it is necessary not only to adopt appropriate technical standards, practices and architecture, but also to develop legal frameworks that facilitate access to and use of research data. This chapter provides an overview of the current research landscape in Australia as it relates to the collection, management and sharing of research data. The chapter then explains the Australian legal regimes relevant to data, including copyright, patent, privacy, confidentiality and contract law. Finally, this chapter proposes the infrastructure elements that are required for the proper management of legal interests, ownership rights and rights to access and use data collected or generated by research projects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

International law’s capacity to influence state behaviour by regulating recourse to violence has been a longstanding source of debate among international lawyers and political scientists. On the one hand, sceptics assert that frequent violations of the prohibition on the use of force have rendered article 2(4) of the UN Charter redundant. They contend that national self-interest, rather than international law, is the key determinant of state behaviour regarding the use of force. On the other hand, defenders of article 2(4) argue first, that most states comply with the Charter framework, and second, that state rhetoric continues to acknowledge the existence of the jus ad bellum. In particular, the fact that violators go to considerable lengths to offer legal or factual justifications for their conduct – typically by relying on the right of self-defence – is advanced as evidence that the prohibition on the use of force retains legitimacy in the eyes of states. This paper identifies two potentially significant features of state practice since 2006 which may signal a shift in states’ perceptions of the normative authority of article 2(4). The first aspect is the recent failure by several states to offer explicit legal justifications for their use or force, or to report action taken in self-defence to the Security Council in accordance with Article 51. Four incidents linked to the global “war on terror” are examined here: Israeli airstrikes in Syria in 2007 and in Sudan in 2009, Turkey’s 2006-2008 incursions into northern Iraq, and Ethiopia’s 2006 intervention in Somalia. The second, more troubling feature is the international community’s apparent lack of concern over the legality of these incidents. Each use of force is difficult to reconcile with the strict requirements of the jus ad bellum; yet none attracted genuine legal scrutiny or debate among other states. While it is too early to conclude that these relatively minor incidents presage long term shifts in state practice, viewed together the two developments identified here suggest a possible downgrading of the role of international law in discussions over the use of force, at least in conflicts linked to the “war on terror”. This, in turn, may represent a declining perception of the normative authority of the jus ad bellum, and a concomitant admission of the limits of international law in regulating violence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social networks have proven to be an attractive avenue of investigation for researchers since humans are social creatures. Numerous literature have explored the term “social networks” from different perspectives and in diverse research fields. With the popularity of the Internet, social networking has taken on a new dimension. Online social communities therefore have become an emerging social avenue for people to communicate in today’s information age. People use online social communities to share their interests, maintain friendships, and extend their so-called circle of “friends”. Likewise, social capital, also known as human capital, is an important theory in sociology. Researchers usually utilise social capital theory when they investigate the topic relating to social networks. However, there is little literature that can provide an explicit and strong assertion in that research area due to the complexity of social capital. This thesis therefore focuses on the issue related to providing a better understanding about the relationship between social capital and online social communities. To enhance the value within the scope of this analysis, an online survey was conducted to examine the effects of the dimensions of social capital: relational capital, structural capital, and cognitive capital, determining the intensity of using online social communities. The data were derived from a total of 350 self-selected respondents completing an online survey during the research period. The main results indicate that social capital exists in online social communities under normal circumstances. Finally, this thesis also presents three contributions for both theory and practice in Chapter 5. The main results contribute to the understanding of connectivity in the interrelationships between individual social capital exchange within online social networks. Secondly, social trust was found to have a weak effect in influencing the intensity of individuals using online social communities. Third, the perpetual role of information sharing has an indirect influence on individual users participating in online social communities. This study also benefits online marketing consultants as marketers can not only gain consumer information easier from online social communities but also this understanding assists in designing effective communication within online social communities. The cross-sectional study, the reliability of Internet survey data, and sampling issues are the major three limitations in this research. The thesis provides a new research model and recommends that the mediating effects, privacy paradox, and social trust on online social communities should be further explored in future research.