343 resultados para Information privacy Framework
Resumo:
In some delay-tolerant communication systems such as vehicular ad-hoc networks, information flow can be represented as an infectious process, where each entity having already received the information will try to share it with its neighbours. The random walk and random waypoint models are popular analysis tools for these epidemic broadcasts, and represent two types of random mobility. In this paper, we introduce a simulation framework investigating the impact of a gradual increase of bias in path selection (i.e. reduction of randomness), when moving from the former to the latter. Randomness in path selection can significantly alter the system performances, in both regular and irregular network structures. The implications of these results for real systems are discussed in details.
Resumo:
Purpose This study explores the informed learning experiences of early career academics while building their networks for professional and personal development. The notion that information and learning are inextricably linked via the concept of ‘informed learning’ is used as a conceptual framework to gain a clearer picture of what informs early career academics while they learn and how they experience using that which informs their learning within this complex practice: to build, maintain and utilise their developmental networks. Methodology This research employs a qualitative framework using a constructivist grounded theory approach (Charmaz, 2006). Through semi-structured interviews with a sample of fourteen early career academics from across two Australian universities, data were generated to investigate the research questions. The study used the methods of constant comparison to create codes and categories towards theme development. Further examination considered the relationship between thematic categories to construct an original theoretical model. Findings The model presented is a ‘knowledge ecosystem’, which represents the core informed learning experience. The model consists of informal learning interactions such as relating to information to create knowledge and engaging in mutually supportive relationships with a variety of knowledge resources found in people who assist in early career development. Originality/Value Findings from this study present an alternative interpretation of informed learning that is focused on processes manifesting as human interactions with informing entities revolving around the contexts of reciprocal human relationships.
Resumo:
By definition, regulatory rules (in legal context called norms) intend to achieve specific behaviour from business processes, and might be relevant to the whole or part of a business process. They can impose conditions on different aspects of process models, e.g., control-flow, data and resources etc. Based on the rules sets, norms can be classified into various classes and sub-classes according to their effects. This paper presents an abstract framework consisting of a list of norms and a generic compliance checking approach on the idea of (possible) execution of processes. The proposed framework is independent of any existing formalism, and provides a conceptually rich and exhaustive ontology and semantics of norms needed for business process compliance checking. The possible uses of the proposed framework include to compare different compliance management frameworks (CMFs).
Resumo:
This thesis considers whether the Australian Privacy Commissioner's use of its powers supports compliance with the requirement to 'take reasonable steps' to protect personal information in National Privacy Principle 4 of the Privacy Act 1988 (Cth). Two unique lenses were used. First, the Commissioner's use of powers was assessed against the principles of transparency, balance and vigorousness and secondly against alignment with an industry practice approach to securing information. Following a comprehensive review of publicly available materials, interviews and investigation file records, this thesis found that the Commissioner's use of his powers has not been transparent, balanced or vigorous, nor has it been supportive of an industry practice approach to securing data. Accordingly, it concludes that the Privacy Commissioner's use of its regulatory powers is unlikely to result in any significant improvement to the security of personal information held by organisations in Australia.
The dual nature of information systems in enabling a new wave of hardware ventures: Towards a theory
Resumo:
Hardware ventures are emerging entrepreneurial firms that create new market offerings based on development of digital devices. These ventures are important elements in the global economy but have not yet received much attention in the literature. Our interest in examining hardware ventures is specifically in the role that information system (IS) resources play in enabling them. We ask how the role of IS resources for hardware ventures can be conceptualized and develop a framework for assessment. Our framework builds on the distinction of operand and operant resources and distinguishes between two key lifecycle stages of hardware ventures: start-up and growth. We show how this framework can be used to discuss the role, nature, and use of IS for hardware ventures and outline empirical research strategies that flow from it. Our work contributes to broadening and enriching the IS field by drawing attention to its role in significant and novel phenomena.
Resumo:
This research explored the knowledge, skills, qualities, and professional education needs, of information professionals in galleries, libraries, archives and museums (GLAM) in Australia. The findings revealed that although full convergence of these sectors is unlikely, many of the skills, knowledge and qualities would be required across all four sectors. The research used the Grounded Delphi Method, a relatively new methodological extension of the Delphi method that incorporates aspects of Grounded Theory. The findings provide the first empirically based guidelines around what needs to be included in an educational framework for information professionals who will work in the emerging GLAM environment. As the first study of GLAM education requirements in Australia and the wider Asia-Pacific region to take a holistic approach by engaging information professionals across all four sectors, this thesis makes a contribution to the GLAM research field and to information education generally.
Resumo:
Conceptual combination performs a fundamental role in creating the broad range of compound phrases utilised in everyday language. While the systematicity and productivity of language provide a strong argument in favour of assuming compositionality, this very assumption is still regularly questioned in both cognitive science and philosophy. This article provides a novel probabilistic framework for assessing whether the semantics of conceptual combinations are compositional, and so can be considered as a function of the semantics of the constituent concepts, or not. Rather than adjudicating between different grades of compositionality, the framework presented here contributes formal methods for determining a clear dividing line between compositional and non-compositional semantics. Compositionality is equated with a joint probability distribution modelling how the constituent concepts in the combination are interpreted. Marginal selectivity is emphasised as a pivotal probabilistic constraint for the application of the Bell/CH and CHSH systems of inequalities (referred to collectively as Bell-type). Non-compositionality is then equated with either a failure of marginal selectivity, or, in the presence of marginal selectivity, with a violation of Bell-type inequalities. In both non-compositional scenarios, the conceptual combination cannot be modelled using a joint probability distribution with variables corresponding to the interpretation of the individual concepts. The framework is demonstrated by applying it to an empirical scenario of twenty-four non-lexicalised conceptual combinations.
Resumo:
Real-world cryptographic protocols such as the widely used Transport Layer Security (TLS) protocol support many different combinations of cryptographic algorithms (called ciphersuites) and simultaneously support different versions. Recent advances in provable security have shown that most modern TLS ciphersuites are secure authenticated and confidential channel establishment (ACCE) protocols, but these analyses generally focus on single ciphersuites in isolation. In this paper we extend the ACCE model to cover protocols with many different sub-protocols, capturing both multiple ciphersuites and multiple versions, and define a security notion for secure negotiation of the optimal sub-protocol. We give a generic theorem that shows how secure negotiation follows, with some additional conditions, from the authentication property of secure ACCE protocols. Using this framework, we analyse the security of ciphersuite and three variants of version negotiation in TLS, including a recently proposed mechanism for detecting fallback attacks.
Resumo:
“If Hollywood could order intellectual property laws for Christmas, what would they look like? This is pretty close.” David Fewer “While European and American IP maximalists have pushed for TRIPS-Plus provisions in FTAs and bilateral agreements, they are now pushing for TRIPS-Plus-Plus protections in these various forums.” Susan Sell “ACTA is a threat to the future of a free and open Internet.” Alexander Furnas “Implementing the agreement could open a Pandora's box of potential human rights violations.” Amnesty International. “I will not take part in this masquerade.” Kader Arif, Rapporteur for the Anti-Counterfeiting Trade Agreement 2011 in the European Parliament Executive Summary As an independent scholar and expert in intellectual property, I am of the view that the Australian Parliament should reject the adoption of the Anti-Counterfeiting Trade Agreement 2011. I would take issue with the Department of Foreign Affairs and Trade’s rather partisan account of the negotiations, the consultations, and the outcomes associated with the Anti-Counterfeiting Trade Agreement 2011. In my view, the negotiations were secretive and biased; the local consultations were sometimes farcical because of the lack of information about the draft texts of the agreement; and the final text of the Anti-Counterfeiting Trade Agreement 2011 is not in the best interests of Australia, particularly given that it is a net importer of copyright works and trade mark goods and services. I would also express grave reservations about the quality of the rather pitiful National Interest Analysis – and the lack of any regulatory impact statement – associated with the Anti-Counterfeiting Trade Agreement 2011. The assertion that the Anti-Counterfeiting Trade Agreement 2011 does not require legislative measures is questionable – especially given the United States Trade Representative has called the agreement ‘the highest-standard plurilateral agreement ever achieved concerning the enforcement of intellectual property rights.’ It is worthwhile reiterating that there has been much criticism of the secretive and partisan nature of the negotiations surrounding the Anti-Counterfeiting Trade Agreement 2011. Sean Flynn summarizes these concerns: "The negotiation process for ACTA has been a case study in establishing the conditions for effective industry capture of a lawmaking process. Instead of using the relatively transparent and inclusive multilateral processes, ACTA was launched through a closed and secretive “‘club approach’ in which like-minded jurisdictions define enforcement ‘membership’ rules and then invite other countries to join, presumably via other trade agreements.” The most influential developing countries, including Brazil, India, China and Russia, were excluded. Likewise, a series of manoeuvres ensured that public knowledge about the specifics of the agreement and opportunities for input into the process were severely limited. Negotiations were held with mere hours notice to the public as to when and where they would be convened, often in countries half away around the world from where public interest groups are housed. Once there, all negotiation processes were closed to the public. Draft texts were not released before or after most negotiating rounds, and meetings with stakeholders took place only behind closed doors and off the record. A public release of draft text, in April 2010, was followed by no public or on-the-record meetings with negotiators." Moreover, it is disturbing that the Anti-Counterfeiting Trade Agreement 2011 has been driven by ideology and faith, rather than by any evidence-based policy making Professor Duncan Matthews has raised significant questions about the quality of empirical evidence used to support the proposal of Anti-Counterfeiting Trade Agreement 2011: ‘There are concerns that statements about levels of counterfeiting and piracy are based either on customs seizures, with the actual quantities of infringing goods in free circulation in any particular market largely unknown, or on estimated losses derived from industry surveys.’ It is particularly disturbing that, in spite of past criticism, the Department of Foreign Affairs and Trade has supported the Anti-Counterfeiting Trade Agreement 2011, without engaging the Productivity Commission or the Treasury to do a proper economic analysis of the proposed treaty. Kader Arif, Rapporteur for the Anti-Counterfeiting Trade Agreement 2011 in the European Parliament, quit his position, and said of the process: "I want to denounce in the strongest possible manner the entire process that led to the signature of this agreement: no inclusion of civil society organisations, a lack of transparency from the start of the negotiations, repeated postponing of the signature of the text without an explanation being ever given, exclusion of the EU Parliament's demands that were expressed on several occasions in our assembly. As rapporteur of this text, I have faced never-before-seen manoeuvres from the right wing of this Parliament to impose a rushed calendar before public opinion could be alerted, thus depriving the Parliament of its right to expression and of the tools at its disposal to convey citizens' legitimate demands.” Everyone knows the ACTA agreement is problematic, whether it is its impact on civil liberties, the way it makes Internet access providers liable, its consequences on generic drugs manufacturing, or how little protection it gives to our geographical indications. This agreement might have major consequences on citizens' lives, and still, everything is being done to prevent the European Parliament from having its say in this matter. That is why today, as I release this report for which I was in charge, I want to send a strong signal and alert the public opinion about this unacceptable situation. I will not take part in this masquerade." There have been parallel concerns about the process and substance of the Anti-Counterfeiting Trade Agreement 2011 in the context of Australia. I have a number of concerns about the substance of the Anti-Counterfeiting Trade Agreement 2011. First, I am concerned that the Anti-Counterfeiting Trade Agreement 2011 fails to provide appropriate safeguards in respect of human rights, consumer protection, competition, and privacy laws. It is recommended that the new Joint Parliamentary Committee on Human Rights investigate this treaty. Second, I argue that there is a lack of balance to the copyright measures in the Anti-Counterfeiting Trade Agreement 2011 – the definition of piracy is overbroad; the suite of civil remedies, criminal offences, and border measures is excessive; and there is a lack of suitable protection for copyright exceptions, limitations, and remedies. Third, I discuss trade mark law, intermediary liability, and counterfeiting. I express my concerns, in this context, that the Anti-Counterfeiting Trade Agreement 2011 could have an adverse impact upon consumer interests, competition policy, and innovation in the digital economy. I also note, with concern, the lobbying by tobacco industries for the Anti-Counterfeiting Trade Agreement 2011 – and the lack of any recognition in the treaty for the capacity of countries to take measures of tobacco control under the World Health Organization Framework Convention on Tobacco Control. Fourth, I note that the Anti-Counterfeiting Trade Agreement 2011 provides no positive obligations to promote access to essential medicines. It is particularly lamentable that Australia and the United States of America have failed to implement the Doha Declaration on the TRIPS Agreement and Public Health 2001 and the WTO General Council Decision 2003. Fifth, I express concerns about the border measures in the Anti-Counterfeiting Trade Agreement 2011. Such measures lack balance – and unduly favour the interests of intellectual property owners over consumers, importers, and exporters. Moreover, such measures will be costly, as they involve shifting the burden of intellectual property enforcement to customs and border authorities. Interdicting, seizing, and destroying goods may also raise significant trade issues. Finally, I express concern that the Anti-Counterfeiting Trade Agreement 2011 undermines the role of existing international organisations, such as the United Nations, the World Intellectual Property Organization and the World Trade Organization, and subverts international initiatives such as the WIPO Development Agenda 2007. I also question the raison d'être, independence, transparency, and accountability of the proposed new ‘ACTA Committee’. In this context, I am concerned by the shift in the position of the Labor Party in its approach to international treaty-making in relation to intellectual property. The Australian Parliament adopted the Australia-United States Free Trade Agreement 2004, which included a large Chapter on intellectual property. The treaty was a ‘TRIPs-Plus’ agreement, because the obligations were much more extensive and prescriptive than those required under the multilateral framework established by the TRIPS Agreement 1994. During the debate over the Australia-United States Free Trade Agreement 2004, the Labor Party expressed the view that it would seek to mitigate the effects of the TRIPS-Plus Agreement, when at such time it gained power. Far from seeking to ameliorate the effects of the Australia-United States Free Trade Agreement 2004, the Labor Government would seek to lock Australia into a TRIPS-Double Plus Agreement – the Anti-Counterfeiting Trade Agreement 2011. There has not been a clear political explanation for this change in approach to international intellectual property. For both reasons of process and substance, I conclude that the Australian Parliament and the Australian Government should reject the Anti-Counterfeiting Trade Agreement 2011. The Australian Government would do better to endorse the Washington Declaration on Intellectual Property and the Public Interest 2011, and implement its outstanding obligations in respect of access to knowledge, access to essential medicines, and the WIPO Development Agenda 2007. The case study of the Anti-Counterfeiting Trade Agreement 2011 highlights the need for further reforms to the process by which Australia engages in international treaty-making.
Resumo:
Due to ever increasing climate instability, the number of natural disasters affecting society and communities is expected to increase globally in the future, which will result in a growing number of casualties and damage to property and infrastructure. Such damage poses crucial challenges for recovery of interdependent critical infrastructures. Post-disaster reconstruction is a complex undertaking as it is not only closely linked to the well-being and essential functioning of society, but also requires a large financial commitment. Management of critical infrastructure during post-disaster recovery needs to be underpinned by a holistic recognition that the recovery of each individual infrastructure system (e.g. energy, water, transport and information and communication technology) can be affected by the interdependencies that exist between these different systems. A fundamental characteristic of these interdependencies is that failure of one critical infrastructure system can result in the failure of other interdependent infrastructures, leading to a cascade of failures, which can impede post-disaster recovery and delay the subsequent reconstruction process. Consequently, there is a critical need for developing a holistic strategy to assess the influence of infrastructure interdependencies, and for incorporating these interdependencies into a post-disaster recovery strategy. This paper discusses four key dimensions of interdependencies that need to be considered in a post-disaster reconstruction planning. Using key concepts and sub-concepts derived from the notion of interdependency, the paper examines how critical infrastructure interdependencies affect the recovery processes of damaged infrastructures.
Resumo:
Engineers and asset managers must often make decisions on how to best allocate limited resources amongst different interrelated activities, including repair, renewal, inspection, and procurement of new assets. The presence of project interdependencies and the lack of sufficient information on the true value of an activity often produce complex problems and leave the decision maker guessing about the quality and robustness of their decision. In this paper, a decision support framework for uncertain interrelated activities is presented. The framework employs a methodology for multi-criteria ranking in the presence of uncertainty, detailing the effect that uncertain valuations may have on the priority of a particular activity. The framework employs employing semi-quantitative risk measures that can be tailored to an organisation and enable a transparent and simple-to-use uncertainty specification by the decision maker. The framework is then demonstrated on a real world project set from a major Australian utility provider.
Resumo:
Theories of individual attitudes toward IT include task technology fit (TTF), technology acceptance model (TAM), unified theory of acceptance and use of technology (UTAUT), cognitive fit, expectation disconfirmation, and computer self-efficacy. Examination of these theories reveals three main concerns. First, the theories mostly ‘‘black box’’ (or omit) the IT artifact. Second, appropriate mid-range theory is not developed to contribute to disciplinary progress and to serve the needs of our practitioner community. Third, theories are overlapping but incommensurable. We propose a theoretical framework that harmonizes these attitudinal theories and shows how they can be specialized to include relevant IS phenomenon.
Resumo:
With the current emerging development pattern in Malaysia, Malaysian government has enthusiastically promoted green procurement approach that will help the construction project being green. Previous studies highlighted that the concept of green procurement is still very new to the Malaysian construction industry, and this increases the needs for further research in this area. This paper addresses the needs of guidelines for stakeholders to procure environmentally-friendly construction. Currently, there is a limited practical guideline for stakeholders to procure green projects. This paper discusses the progress to date of a research project aimed at developing a green procurement framework for construction projects in the Malaysian construction industry. This framework will guide the stakeholders to plan the green procurement implementation to procure a construction projects. Through literature and expert opinion, this paper explores the list of green practices within procurement practices which becomes the basis to develop a survey instrument that will be used in the later part of this study. The paper will shed useful information for construction researchers and practitioners in exploring the green procurement concept for construction industry in Malaysia.
Resumo:
This study investigates friendships between gay sales associates and heterosexual female customers in luxury retail settings. By employing grounded theory methodology, the study integrates theories and findings from diverse literature streams into an original conceptual framework to illustrate the resources gay sales associates and straight female customers receive from and provide to each other during retail exchanges. The study explains why gay male–straight female friendships are uniquely suited for luxury consumption settings. Female customers characterize their friendships with gay sales associates as providing honesty, security, trust, and comfort, which stems from the absence of sexual interest and a lack of inter-female competition. Gay sales associates receive acceptance for who they are and for their displays of unconventional masculinity in retail settings. They also obtain a temporary rite from their female customers, a so-called mandate of privacy, which permits both parties to ignore the bounds of modesty and accept a degree of intimacy. Such intimacy facilitates transactions that require both personalization and customer–employee closeness, such as the selling of high-end apparel, accessories, and jewelry.
Resumo:
With the ever increasing amount of eHealth data available from various eHealth systems and sources, Health Big Data Analytics promises enticing benefits such as enabling the discovery of new treatment options and improved decision making. However, concerns over the privacy of information have hindered the aggregation of this information. To address these concerns, we propose the use of Information Accountability protocols to provide patients with the ability to decide how and when their data can be shared and aggregated for use in big data research. In this paper, we discuss the issues surrounding Health Big Data Analytics and propose a consent-based model to address privacy concerns to aid in achieving the promised benefits of Big Data in eHealth.