441 resultados para privacy violations


Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is widely recognised that exposure to air pollutants affect pulmonary and lung dysfunction as well as a range of neurological and vascular disorders. The rapid increase of worldwide carbon emissions continues to compromise environmental sustainability whilst contributing to premature death. Moreover, the harms caused by air pollution have a more pernicious reach, such as being the major source of climate change and ‘natural disasters’, which reportedly kills millions of people each year (World Health Organization, 2012). The opening quotations tell a story of the UK government's complacency towards the devastation of toxic and contaminating air emissions. The above headlines greeted the British public earlier this year after its government was taken to the Court of Appeal for an appalling air pollution record that continues to cause the premature deaths of 30,000 British people each year at a health cost estimated at £20 billion per annum. This combined with pending legal proceedings against the UK government for air pollution violations by the European Commission, point to a Cameron government that prioritises hot air and profit margins over human lives. The UK's legal air pollution regimes are an industry dominated process that relies on negotiation and partnership between regulators and polluters. The entire model seeks to assist business compliance rather than punish corporate offenders. There is no language of ‘crime’ in relation to UK air pollution violations but rather a discourse of ‘exceedence’ (Walters, 2010). It is a regulatory system not premised on the ‘polluter pay’ principle but instead the ‘polluter profit’ principle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user susceptibility to attacks. In this work, we examine whether computer or security expertise affects use of web browser security indicators. Our study takes place in the context of web-based single sign-on, in which a user can use credentials from a single identity provider to login to many relying websites; single sign-on is a more complex, and hence more difficult, security task for users. In our study, we used eye trackers and surveyed participants to examine the cues individuals use and those they report using, respectively. Our results show that users with security expertise are more likely to self-report looking at security indicators, and eye-tracking data shows they have longer gaze duration at security indicators than those without security expertise. However, computer expertise alone is not correlated with recorded use of security indicators. In survey questions, neither experts nor novices demonstrate a good understanding of the security consequences of web-based single sign-on.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objectives: This qualitative study canvassed residents' perceptions of the needs and barriers to the expression of sexuality in long-term care. Methods: Sixteen residents, including five with dementia, from six aged care facilities in two Australian states were interviewed. Data were analysed using a constant comparative method. Results: Four categories describe residents' views about sexuality, their needs and barriers to its expression: ‘It still matters’; ‘Reminiscence and resignation’, ‘It's personal’, and ‘It's an unconducive environment’. Discussion: Residents, including those with dementia, saw themselves as sexual beings and with a continuing need and desire to express their sexuality. The manner in which it was expressed varied. Many barriers to sexual expression were noted, including negative attitudes of staff, lack of privacy and limited opportunities for the establishment of new relationships or the continuation of old ones. Interviewees agreed that how a resident expressed their sexuality was their business and no one else's.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wandering is aimless and repetitive locomotion that may expose persons with dementia (PWD) to elopement, getting lost and death. This study is an Australian replication of a US study. Cross-disciplinary consensus- based analysis was applied to data from five focus groups (N =47: cognitively intact LTC residents (5), carers of PWD (11), home care workers (13) allied health professionals and health-focused engineers (7) and RNs (11). Groups received briefing about wandering monitoring and elopement management systems. Consistent with US attitudes, participants in all groups agreed on what a wandering technology should do, how it should do it, and necessary technical specifications. Within each group participants raised the need for a continuum of care for PWD and the imperative for early recognition of potentially dangerous wandering and getting lost when they occur. Global Positioning System elopement management was the preferred option. Interestingly, the prospective value of GPS to recover a lost or eloped wanderer far outweighed privacy concerns, as in the US. A pervasive theme was that technologies need to augment, but cannot replace, attentive, compassionate caregiver presence. A significant theme raised only by Australian carers of PWD was the potential for development of implantable GPS technologies and the need for public debate about attendant ethical issues. Given that 60% or more of over 200,000 Australians and 4.5 million Americans with dementia will develop wandering, there is a pressing need to develop effective locator systems that may delay institutionalization, help allay carer concern and enhance PWD safety.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social harmony can manifest in many ways. In rapidly motorizing countries like China, a growing area of potential disharmony is road use. The increased ability to purchase a car for the first time and a subsequent increase in new drivers has seen several Chinese cities take unprecedented measures to manage congestion. There is a corresponding need to ensure effective traffic law enforcement in promoting a safe environment for all road users. This paper reports qualitative research conducted with Beijing car drivers to investigate perceptions of unsafe road use, penalties for traffic violations, and improvements for the current system. Overall, the findings suggest awareness among drivers of many of the key risk factors. A perceived lack of clarity in how penalties are determined was identified and drivers in-dicated a desire to know how revenue from traffic fines is used. Several suggestions for improving the current system included school/community education about road risks and traffic law. The rise of private car ownership in China may contribute to a more harmonious personal life, but at the same time, may contribute to a decrease in societal harmony. A major challenge for authorities in any country is to promote the idea of a collective responsibility for road safety (traffic harmony), especially to those who perceive that traffic rules do not apply to them. This is a potentially greater challenge for China as it strives to balance harmony on the road and harmony in the broader society.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

China is motorizing rapidly, with associated urban road development and extensive construction of motorways. Speeding accounts for about 10% of fatalities, which represents a large decrease from a peak of 17.2% in 2004. Speeding has been addressed at a national level through the introduction of laws and procedural requirements in 2004, in provinces either across all road types or on motorways, and at city level. Typically, documentation of speed enforcement programmes has taken place when new technology (i.e. speed cameras) is introduced, and it is likely that many programmes have not been documented or widely reported. In particular, the national legislation of 2004 and its implementation was associated with a large reduction in fatalities attributed to speeding. In Guangdong Province, after using speed detection equipment, motorway fatalities due to speeding in 2005 decreased by 32.5% comparing with 2004. In Beijing, the number of traffic monitoring units which were used to photograph illegal traffic activities such as traffic light violations, speeding and using bus lanes illegally increased to 1958 by April 1, 2009, and in the future such automated enforcement will become the main means of enforcement, expected to account for 60% of all traffic enforcement in Beijing. This paper provides a brief overview of the speeding enforcement programmes in China which have been documented and their successes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the greatest challenges facing the Roman Catholic Church (the Church) across the world continues to be found in addressing complaints of child sexual abuse (csa) by clergy. The list of Catholic clergy in Australia who have been criminally processed for sexual offences against children is disturbingly long. As disturbing as this list is, more disturbing are the accounts of clergy who have not been criminally prosecuted, but protected within the cloister of the Church. It is increasingly recognised that the significant difficulty with child sexual abuse in Catholic Churches, in particular, has not been the presence of perpetrators but the response of Church leadership to allegations of csa by clergy. Those who have faced criminal charges have often done so due to the resilience of victim/survivors and not because of the support of Church structures or culture. The Church has been slow to come to terms with the realities of the perpetration of csa by its clergy and even slower to recognise the need to prioritise victims in any effective, just response. The church has been slowest of all recognising that there are significant cultural and discursive challenges to confront in addressing the management of csa by clergy. There is, however, progressive recognition of the role that discursive constructs of forgiveness have played in perpetuating the crises and ultimately in perpetuating abuse. The institutional praxis of forgiveness can be demonstrated not only in the Church, but in lessons learned from use of forgiveness as an institutional response to mass violations of human rights. This paper explores the juncture between criminality, church culture and forgiveness in responding to csa by clergy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A 'Gated and Guarded Community' has become a popular trend in the recent years, particularly for housing areas. The increasing in population and income has lead to the increase in housing demand. The 1991 Population Census Report showed that Malaysian population has increased with an average yearly rate of 2.7% per year, that is, from 13.74 million people in 1980 to 19.35 million in 1991, followed by 20.69 million in 1995 and increase to 23.27 in year 2000. This is followed by consistent increase in the average population monthly income. Started from 1995 to 1999, the average annual growth rate of mean monthly income in Malaysia is about 5.2 %, from RM2,020.00 in 1995 to RM2,472.00 in 1999 and increasing constantly. This shows that the human growth usually have correlation between demand, income and housing. This paper presents the factors that involved in determined the Gated and Guarded Community Investment in Malaysia either it is worth to invest or otherwise. Hopefully, the results will also indicate that there may be other factors affecting their investment decision besides security and privacy. This paper is actually to draw attention to some practitioner and collect more information in establishing my research analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

‘Positive Stories’ is a digital storytelling initiative that took place in Adelaide in 2010–2011.1 This article describes participants’ experiences of creative self-representation and the thorny complications of mediating voice, particularly in situations where privacy and publicity are significant issues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks. Traditional centralised network security is difficult to implement in such a network, therefore distributed security solutions are more desirable in DTN implementations. Establishing effective trust in distributed systems with no centralised Public Key Infrastructure (PKI) such as the Pretty Good Privacy (PGP) scheme usually requires human intervention. Our aim is to build and compare different de- centralised trust systems for implementation in autonomous DTN systems. In this paper, we utilise a key distribution model based on the Web of Trust principle, and employ a simple leverage of common friends trust system to establish initial trust in autonomous DTN’s. We compare this system with two other methods of autonomously establishing initial trust by introducing a malicious node and measuring the distribution of malicious and fake keys. Our results show that the new trust system not only mitigates the distribution of fake malicious keys by 40% at the end of the simulation, but it also improved key distribution between nodes. This paper contributes a comparison of three de-centralised trust systems that can be employed in autonomous DTN systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which uses a majority clocking rule to update its registers. It is designed to provide privacy for the GSM system. In this paper, we analyse the initialisation process of A5/1. We demonstrate a sliding property of the A5/1 cipher, where every valid internal state is also a legitimate loaded state and multiple key-IV pairs produce phase shifted keystream sequences. We describe a possible ciphertext only attack based on this property.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper gives an overview of the INEX 2011 Snippet Retrieval Track. The goal of the Snippet Retrieval Track is to provide a common forum for the evaluation of the effectiveness of snippets, and to investigate how best to generate snippets for search results, which should provide the user with sufficient information to determine whether the underlying document is relevant. We discuss the setup of the track, and the evaluation results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A complex attack is a sequence of temporally and spatially separated legal and illegal actions each of which can be detected by various IDS but as a whole they constitute a powerful attack. IDS fall short of detecting and modeling complex attacks therefore new methods are required. This paper presents a formal methodology for modeling and detection of complex attacks in three phases: (1) we extend basic attack tree (AT) approach to capture temporal dependencies between components and expiration of an attack, (2) using enhanced AT we build a tree automaton which accepts a sequence of actions from input message streams from various sources if there is a traversal of an AT from leaves to root, and (3) we show how to construct an enhanced parallel automaton that has each tree automaton as a subroutine. We use simulation to test our methods, and provide a case study of representing attacks in WLANs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last two decades, the internet and e-commerce have reshaped the way we communicate, interact and transact. In the converged environment enabled by high speed broadband, web 2.0, social media, virtual worlds, user-generated content, cloud computing, VoIP, open source software and open content have rapidly become established features of our online experience. Business and government alike are increasingly using the internet as the preferred platform for delivery of their goods and services and for effective engagement with their clients. New ways of doing things online and challenges to existing business, government and social activities have tested current laws and often demand new policies and laws, adapted to the new realities. The focus of this book is the regulation of social, cultural and commercial activity on the World Wide Web. It considers developments in the law that have been, and continue to be, brought about by the emergence of the internet and e-commerce. It analyses how the law is applied to define rights and obligations in relation to online infrastructure, content and practices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives.