441 resultados para privacy violations
Resumo:
Teleradiology allows medical images to be transmitted over electronic networks for clinical interpretation, and for improved healthcare access, delivery and standards. Although, such remote transmission of the images is raising various new and complex legal and ethical issues, including image retention and fraud, privacy, malpractice liability, etc., considerations of the security measures used in teleradiology remain unchanged. Addressing this problem naturally warrants investigations on the security measures for their relative functional limitations and for the scope of considering them further. In this paper, starting with various security and privacy standards, the security requirements of medical images as well as expected threats in teleradiology are reviewed. This will make it possible to determine the limitations of the conventional measures used against the expected threats. Further, we thoroughly study the utilization of digital watermarking for teleradiology. Following the key attributes and roles of various watermarking parameters, justification for watermarking over conventional security measures is made in terms of their various objectives, properties, and requirements. We also outline the main objectives of medical image watermarking for teleradiology, and provide recommendations on suitable watermarking techniques and their characterization. Finally, concluding remarks and directions for future research are presented.
Resumo:
Narratives of forced migration are open to a variety of interpretations. In mental health, refugee narratives of arduous journeys in the face of systemic macro socio-political forces are often transformed from this context into a medicalized micro context of inner individual worlds. Both the dominant pathogenic lens of trauma studies and the growing salutogenic lens embodied in resilience research, often reflect a western cultural idiom of focusing on the individualized nature of these phenomena. Using qualitative data collected from refugees from Burma now settling in Australia, the article emphasizes the need for a more reflexive and expansive account of both suffering and hope within refugee narratives. It recounts these narratives within a conceptual framework which acknowledges the importance of the connections between the micro individual experience and the macro, socio-political context. This is not only a question of political principle, but also a matter of listening to the voice of those who know most about the relationship between macro forces of human rights violations and their impact on individual, family and community trajectories.
Resumo:
Normative influences on road user behaviour have been well documented and include such things as personal, group, subjective and moral norms. Commonly, normative factors are examined within one cultural context, although a few examples of exploring the issue across cultures exist. Such examples add to our understanding of differences in perceptions of the normative factors that may exert influence on road users and can assist in determining whether successful road safety interventions in one location may be successful in another. Notably, the literature is relatively silent on such influences in countries experiencing rapidly escalating rates of motorization. China is one such country where new drivers are taking to the roads in unprecedented numbers and authorities are grappling with the associated challenges. This paper presents results from qualitative and quantitative research on self-reported driving speeds of car drivers and related issues in Australia and China. Focus group interviews and questionnaires conducted in each country examined normative factors that might influence driving in each cultural context. Qualitative findings indicated perceptions of community acceptance of speeding were present in both countries but appeared more widespread in China, yet quantitative results did not support this difference. Similarly, with regard to negative social feedback from speeding, qualitative findings suggested no embarrassment associated with speeding among Chinese participants and mixed results among Australian participants, yet quantitative results indicated greater embarrassment for Chinese drivers. This issue was also examined from the perspective of self-identity and findings were generally similar across both samples and appear related to whether it is important to be perceived as a skilled/safe driver by others. An interesting and important finding emerged with regard to how Chinese drivers may respond to questions about road safety issues if the answers might influence foreigners’ perceptions of China. In attempting to assess community norms associated with speeding, participants were asked to describe what they would tell a foreign visitor about the prevalence of speeding in China. Responses indicated that if asked by a foreigner, people may answer in a manner that portrayed China as a safe country (e.g., that drivers do not speed), irrespective of the actual situation. This ‘faking good for foreigners’ phenomenon highlights the importance of considering ‘face’ when conducting research in China – a concept absent from the road safety literature. An additional noteworthy finding that has been briefly described in the road safety literature is the importance and strength of the normative influence of social networks (guanxi) in China. The use of personal networks to assist in avoiding penalties for traffic violations was described by Chinese participants and is an area that could be addressed to strengthen the deterrent effect of traffic law enforcement. Overall, the findings suggest important considerations for developing and implementing road safety countermeasures in different cultural contexts.
Resumo:
Despite the significant health benefits attributed to breastfeeding, rates in countries, such as Australia, continue to remain static or to decline. Typically, the tangible support offered for women to support breastfeeding behaviours takes the form of face-to-face advice from health professionals, peer counselling via not-for-profit organizations such as the ABA, and provision of information through websites, pamphlets, and books. Prior research indicates that face-to-face support is more effective than telephone contact (Britton, McCormic, Renfrew, Wade, & King, 2009). Given the increasing costs associated with the provision of personalized face-to-face professional support and the need for some women to maximize privacy, discretion, and judgment-free consultations, there is a gap that could be filled by the use of m-technologies such as text messaging and other social media. The research team developed MumBubConnect; a two-way SMS system which combined the personalized aspects of face-to-face contact but maintained levels of privacy. The use of SMS was immediate, portable, and overcame many of the barriers associated with embarrassment. An Page 205 of 312 online survey of 130 breastfeeding mothers indicated that MumBubConnect facilitated the seeking of social support using m-technology, increased self-efficacy and maintained the desire behaviour.
Resumo:
Safety at Railway Level Crossings (RLXs) is an important issue within the Australian transport system. Crashes at RLXs involving road vehicles in Australia are estimated to cost $10 million each year. Such crashes are mainly due to human factors; unintentional errors contribute to 46% of all fatal collisions and are far more common than deliberate violations. This suggests that innovative intervention targeting drivers are particularly promising to improve RLX safety. In recent years there has been a rapid development of a variety of affordable technologies which can be used to increase driver’s risk awareness around crossings. To date, no research has evaluated the potential effects of such technologies at RLXs in terms of safety, traffic and acceptance of the technology. Integrating driving and traffic simulations is a safe and affordable approach for evaluating these effects. This methodology will be implemented in a driving simulator, where we recreated realistic driving scenario with typical road environments and realistic traffic. This paper presents a methodology for evaluating comprehensively potential benefits and negative effects of such interventions: this methodology evaluates driver awareness at RLXs , driver distraction and workload when using the technology . Subjective assessment on perceived usefulness and ease of use of the technology is obtained from standard questionnaires. Driving simulation will provide a model of driving behaviour at RLXs which will be used to estimate the effects of such new technology on a road network featuring RLX for different market penetrations using a traffic simulation. This methodology can assist in evaluating future safety interventions at RLXs.
Resumo:
Climate change presents risks to health that must be addressed by both decision-makers and public health researchers. Within the application of Environmental Health Impact Assessment (EHIA), there have been few attempts to incorporate climate change-related health risks as an input to the framework. This study used a focus group design to examine the perceptions of government, industry and academic specialists about the suitability of assessing the health consequences of climate change within an EHIA framework. Practitioners expressed concern over a number of factors relating to the current EHIA methodology and the inclusion of climate change-related health risks. These concerns related to the broad scope of issues that would need to be considered, problems with identifying appropriate health indicators, the lack of relevant qualitative information that is currently incorporated in assessment and persistent issues surrounding stakeholder participation. It was suggested that improvements are needed in data collection processes, particularly in terms of adequate communication between environmental and health practitioners. Concerns were raised surrounding data privacy and usage, and how these could impact on the assessment process. These findings may provide guidance for government and industry bodies to improve the assessment of climate change-related health risks.
Resumo:
Technologies such as smart meters and electricity feedback are becoming an increasingly compelling focus for HCI researchers in light of rising power prices and peak demand. We argue, however, that a pre-occupation with the goal of demand management has limited the scope of design for these technologies. In this paper we present our work-in-progress investigating the potential value of socially sharing electricity information as a means of broadening the scope of design for these devices. This paper outlines some preliminary findings gathered from a design workshop and a series of qualitative interviews with householders in Brisbane, Australia, regarding their attitudes towards electricity feedback and sharing consumption information. Preliminary findings suggest that; (1) the social sharing of electricity feedback information has the potential to be of value in better informing consumption decisions, however; (2) the potential for sharing may be constrained by attitudes towards privacy, trust and the possibility of misinformation being shared. We conclude by outlining ideas for our future research on this topic and invite comments on these ideas.
Resumo:
Open Educational Resources (OER) are teaching, learning and research materials that have been released under an open licence that permits online access and re-use by others. The 2012 Paris OER Declaration encourages the open licensing of educational materials produced with public funds. Digital data and data sets produced as a result of scientific and non-scientific research are an increasingly important category of educational materials. This paper discusses the legal challenges presented when publicly funded research data is made available as OER, arising from intellectual property rights, confidentiality and information privacy laws, and the lack of a legal duty to ensure data quality. If these legal challenges are not understood, addressed and effectively managed, they may impede and restrict access to and re-use of research data. This paper identifies some of the legal challenges that need to be addressed and describes 10 proposed best practices which are recommended for adoption to so that publicly funded research data can be made available for access and re-use as OER.
Resumo:
This paper presents Capital Music, a mobile application enabling real-time sharing of song choices with collocated urban dwellers. Due to the real-time, location-based peer-to-peer approach of the application, a user experience study was performed utilising the Wizard of Oz method. The study provides insight into how sharing non-privacy sensitive but personal data in an anonymous way can influence the user experience of people in public urban places. We discuss the findings in relation to how Capital Music influences the process of “cocooning” in public urban places, the practice of designing anonymous interactions between collocated strangers, and how the sharing of song choices can create a sense of commonality between anonymous users in the urban space. The outcomes of this study are relevant for future location-based social networking applications that aim to create interactions between collocated strangers.
Resumo:
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.
Resumo:
Information privacy requirements of patients and information requirements of healthcare providers (HCP) are competing concerns. Reaching a balance between these requirements have proven difficult but is crucial for the success of eHealth systems. The traditional approaches to information management have been preventive measures which either allow or deny access to information. We believe that this approach is inappropriate for a domain such as healthcare. We contend that introducing information accountability (IA) to eHealth systems can reach the aforementioned balance without the need for rigid information control. IA is a fairly new concept to computer science, hence; there are no unambiguously accepted principles as yet. But the concept delivers promising advantages to information management in a robust manner. Accountable-eHealth (AeH) systems are eHealth systems which use IA principles as the measure for privacy and information management. AeH systems face three main impediments; technological, social and ethical and legal. In this paper, we present the AeH model and focus on the legal aspects of AeH systems in Australia. We investigate current legislation available in Australia regarding health information management and identify future legal requirements if AeH systems are to be implemented in Australia.
Resumo:
Saudi Arabia experiences housing shortage for mid and low-income families, which is caused by rapid population growth. This condition is worsened by the fact that the current housing supply has problems in meeting both sustainable requirements and cultural needs of those families. This paper aims to investigate the link between the unique conservative Saudi culture and the design of sustainable housing, while keeping the housing cost affordable for mid and low-income families. The paper is based on a review of literatures on the issues of the Islamic culture and how can they be integrated into the design process of a Saudi house. Findings from literature reveiw suggest several design requirements for accommodating the conservative Saudi Culture in low cost sustainable houses. Such requirements include the implementation of proper usage of windows, and house orientation with a courtyard inside rather than facing the main street will provide natural ventilation while maintaining privacy. The main contribution to the body of knowledge is that this is a new approach to sustainable housing in Saudi Arabia considering not only energy use and architectural design issues but also socio-cultural issues as an essential part of sustainability.
Resumo:
Knowing, measuring and understanding media audiences have become a multi-billion dollar business. But the convention that underpins that business, audience ratings, is in crisis. Rating the Audience is the first book to show why and how audience ratings research became a convention, an agreement, and the first to interrogate the ways that agreement is now under threat. Taking a historical approach, the book looks at the evolution of audience ratings and the survey industry. It goes on to analyse today's media environment, looking at the role of the internet and the increased difficulties it presents for measuring audiences. The book covers all the major players and controversies, such as Facebook's privacy rulings and Google's alliance with Nielsen. Offering the first real comparative study, it will be critical for media students and professionals.
Resumo:
The article discusses the recent developments on Freedom of Information or FOI in Queensland. It mentions the recent calls for a new FOI model, pointing to a radical departure from the old FOI template and the emergence of a significantly different FOI regime. Two of these reforms are the Right to Information Bill 2009 or RTI and the Information Privacy Bill 2009 or IP. It also mentions the new FOI Public Interest Test under the RTI Act.
Resumo:
Mandatory data breach notification laws are a novel statutory solution in relation to organizational protections of personal information. They require organizations which have suffered a breach of security involving personal information to notif'y those persons whose information may have been affected. These laws originated in the state based legislatures of the United States during the last decade and have subsequently garnered worldwide legislative interest. Despite their perceived utility, mandatory data breach notification laws have several conceptual and practical concems that limit the scope of their applicability, particularly in relation to existing information privacy law regimes. We outline these concerns, and in doing so, we contend that while mandatory data breach notification laws have many useful facets, their utility as an 'add-on' to enhance the failings of current information privacy law frameworks should not necessarily be taken for granted.