376 resultados para patron privacy
Resumo:
This study provides proposed core elements of social media policy that specifically designed for academic libraries.Evaluation of social media policies from five organisations and a review of the literature were used for data collection.There are 15 proposed core elements recommended: policy objectives; policy definition; scope of the policy;university’s vision and mission; policy users; disclaimer; confidentiality; copyright; privacy; workflow; publicinformation; the use of professional language; the accuracy of the information; rule for links; and university andlibrary’s voices. The results of this study provide important aspects in the development of social media policy. Theproposed core elements of the social media policy discussed in this paper is specifically designed for the academiclibraries, but can also be used for other library types. Kajian ini memuat usulan kerangka kebijakan penggunaan media sosial dari elemen-elemen inti yang disusun khusus untuk perpustakaan perguruan tinggi. Evaluasi kebijakan penggunaan media sosial dari lima organisasi dan kajian literatur digunakan untuk pengumpulan data. Ada 15 elemen inti kebijakan yang diusulkan, yaitu: tujuan kebijakan; definisi kebijakan; lingkup kebijakan; visi dan misi universitas; sasaran pengguna kebijakan; disclaimer; kerahasiaan; hak cipta; privasi; alur kerja; informasi publik; penggunaan bahasa professional; keakuratan informasi; kaidah tautan; serta suara universitas dan perpustakaan. Hasil kajian ini menyediakan aspek penting dalam pengembangan kebijakan penggunaan media sosial. Usulan elemen inti kebijakan yang diusulkan dalam kajian ini secara khusus dirancang untuk perpustakaan perguruan tinggi, tetapi dapat juga digunakan untuk perpustakaan jenis lainnya.
Resumo:
While social media research has provided detailed cumulative analyses of selected social media platforms and content, especially Twitter, newer platforms, apps, and visual content have been less extensively studied so far. This paper proposes a methodology for studying Instagram activity, building on established methods for Twitter research by initially examining hashtags, as common structural features to both platforms. In doing so, we outline methodological challenges to studying Instagram, especially in comparison to Twitter. Finally, we address critical questions around ethics and privacy for social media users and researchers alike, setting out key considerations for future social media research.
Resumo:
This article uses the concept of the architecture of rural life to analyse domestic violence service provision in rural Australia. What is distinctive about this architecture is that it polices the privacy of the rural family. A tight cloak of silence is carved around instances of domestic violence. Imagined threats to rural safety are seen as coming from outsiders (i.e. urban influences or Indigenous), not insiders within rural families. This article draws on key findings from a study conducted in rural New South Wales, Australia. The study interviewed 49 rural service providers working in human services and the criminal justice system. The application of architecture of rural life as a conceptual tool demonstrates challenges with service provision in a rural setting. The main results of this study found that this architecture operates as a silencing form of social control in three distinctive ways. Firstly, shame about being a victim of domestic violence encourages rural women's complicity in remaining silent. Secondly, family privacy maintains a veil of silence that accentuates rural women's social and economic dependency on men. Thirdly, community sanctions act as a deterrent to women seeking help.
Resumo:
Unmanned aircraft, or drones, are a rapidly emerging sector of the aviation industry. There has been limited substantive research, however, into the public perception and acceptance of drones. This paper presents the results from two surveys of the Australian public designed to investigate (a) whether the public perceive drones to be riskier than existing manned aviation, (b) whether the terminology used to describe the technology influences public perception, and (c) what the broader concerns are that may influence public acceptance of the technology. We find that the Australian public currently hold a relatively neutral attitude towards drones. Respondents did not consider the technology to be overly unsafe, risky, beneficial, or threatening. Drones are largely viewed as being of comparable risk to that of existing manned aviation. Further, terminology had a minimal effect on the perception of the risks or acceptability of the technology. The neutral response is likely due to a lack of knowledge about the technology, which was also identified as the most prevalent public concern as opposed to the risks associated with its use. Privacy, military use and misuse (e.g., terrorism) were also significant public concerns. The results suggest that society is yet to form an opinion of drones. As public knowledge increases, the current position is likely to change. Industry communication and media coverage will likely influence the ultimate position adopted by the public, which can be difficult to change once established.
Resumo:
This paper investigates how Muslims living in Brisbane live within their current Australian homes and the liveability and adaptability of these homes from the perspective of home dwellers with respect to their Islamic faiths, cultural traditions and lifestyle. A qualitative case study approach was used to gather information about Muslims’ use of domestic spaces through their lived experiences, within an Australian context. Six participants were interviewed, including: a) three Muslim families residing in one suburb of Brisbane, and; b) three international Muslim students living in three different Brisbane suburbs. These cases indicate that apart from minor difficulties, case study participants were able to perform their daily activities within their current homes through various adaptations made to ensure their respective domestic domains provided their families with privacy and a sense of security and safety. Insight gained from these cases suggest the need for more research into the homes of Muslims homes within an Australian context and the development of culturally adaptable housing as a means of meeting the diverse needs of modern Australian multicultural society.
Resumo:
SIMON is a family of 10 lightweight block ciphers published by Beaulieu et al. from the United States National Security Agency (NSA). A cipher in this family with K -bit key and N -bit block is called SIMON N/K . We present several linear characteristics for reduced-round SIMON32/64 that can be used for a key-recovery attack and extend them further to attack other variants of SIMON. Moreover, we provide results of key recovery analysis using several impossible differential characteristics starting from 14 out of 32 rounds for SIMON32/64 to 22 out of 72 rounds for SIMON128/256. In some cases the presented observations do not directly yield an attack, but provide a basis for further analysis for the specific SIMON variant. Finally, we exploit a connection between linear and differential characteristics for SIMON to construct linear characteristics for different variants of reduced-round SIMON. Our attacks extend to all variants of SIMON covering more rounds compared to any known results using linear cryptanalysis. We present a key recovery attack against SIMON128/256 which covers 35 out of 72 rounds with data complexity 2123 . We have implemented our attacks for small scale variants of SIMON and our experiments confirm the theoretical bias presented in this work.
Resumo:
We present some improved analytical results as part of the ongoing work on the analysis of Fugue-256 hash function, a second round candidate in the NIST’s SHA3 competition. First we improve Aumasson and Phans’ integral distinguisher on the 5.5 rounds of the final transformation of Fugue-256 to 16.5 rounds. Next we improve the designers’ meet-in-the-middle preimage attack on Fugue-256 from 2480 time and memory to 2416. Finally, we comment on possible methods to obtain free-start distinguishers and free-start collisions for Fugue-256.
Resumo:
Although seeking help for mental ill-health is beneficial, the majority of persons afflicted do not access available help services. Young adults (16-24 years old) in particular have the highest prevalence of mental health problems and the lowest rate of help-seeking behaviour. Key barriers to help-seeking for young adults, including cost, privacy concerns, inconvenience, access to health professionals and interpersonal interaction, appear to derive from the face-to-face method of service delivery traditionally used to distribute mental health services. Social marketing employs the principle of value exchange, whereby consumers will choose a behaviour in exchange for receiving valued benefits and/or a reduction in key barriers, to achieve behavioural goals for social good. The appropriation of mobile digital technology to deliver self-help mental health services may reduce the current barriers to help seeking, however, extant literature offers no empirical support for this proposition. Our research addresses this gap by examining the perceptions of young adults regarding M-mental health services. Depth interviews were undertaken with 15 young adults (18-24 years old), who had self-reported mild-moderate stress, anxiety or depression. The data were thematically analysed with the assistance of Nvivo. The findings reveal M-mental health services reduce the barriers to accessing face-to-face help services to a large extent. However, they also present their own barriers to help-seeking that must be considered by social marketers, including negligible cost expectations and service efficacy concerns. Overall, this study highlights the potential of M-mental health services to encourage early intervention and help-seeking behaviour as part of a social marketing strategy to address mental illness in young adults.
Resumo:
Bruno Taut's Glashaus is considered a seminal example of early modernist architecture. Yet, some of the crucial factors behind the design of the Glashaus remain little understood. This PhD reveals that the Glashaus' patron, Frederick Keppler, exerted a significant influence over its design by insisting that it follow a prescriptive brief. Interpreting these rigid instructions, Taut as the architect, gained inspiration from the myths and symbols associated with the Victoria regia lily and the Gothic. This PhD therefore significantly expands the understanding of the Glashaus, and thus reinvigorates our comprehension of one of the most distinctive early examples of modern architecture.
Resumo:
XACML has become the defacto standard for enterprise- wide, policy-based access control. It is a structured, extensible language that can express and enforce complex access control policies. There have been several efforts to extend XACML to support specific authorisation models, such as the OASIS RBAC profile to support Role Based Access Control. A number of proposals for authorisation models that support business processes and workflow systems have also appeared in the literature. However, there is no published work describing an extension to allow XACML to be used as a policy language with these models. This paper analyses the specific requirements of a policy language to express and enforce business process authorisation policies. It then introduces BP-XACML, a new profile that extends the RBAC profile for XACML so it can support business process authorisation policies. In particular, BP-XACML supports the notion of tasks, and constraints at the level of a task instance, which are important requirements in enforcing business process authorisation policies.
Resumo:
Decision-making is such an integral aspect in health care routine that the ability to make the right decisions at crucial moments can lead to patient health improvements. Evidence-based practice, the paradigm used to make those informed decisions, relies on the use of current best evidence from systematic research such as randomized controlled trials. Limitations of the outcomes from randomized controlled trials (RCT), such as “quantity” and “quality” of evidence generated, has lowered healthcare professionals’ confidence in using EBP. An alternate paradigm of Practice-Based Evidence has evolved with the key being evidence drawn from practice settings. Through the use of health information technology, electronic health records (EHR) capture relevant clinical practice “evidence”. A data-driven approach is proposed to capitalize on the benefits of EHR. The issues of data privacy, security and integrity are diminished by an information accountability concept. Data warehouse architecture completes the data-driven approach by integrating health data from multi-source systems, unique within the healthcare environment.
Resumo:
The workshop is an activity of the IMIA Working Group ‘Security in Health Information Systems’ (SiHIS). It is focused to the growing global problem: how to protect personal health data in today’s global eHealth and digital health environment. It will review available trust building mechanisms, security measures and privacy policies. Technology alone does not solve this complex problem and current protection policies and legislation are considered woefully inadequate. Among other trust building tools, certification and accreditation mechanisms are dis-cussed in detail and the workshop will determine their acceptance and quality. The need for further research and international collective action are discussed. This workshop provides an opportunity to address a critical growing problem and make pragmatic proposals for sustainable and effective solutions for global eHealth and digital health.
Resumo:
This study examined the potential for apartment living to become more socially and environmentally acceptable in Australian society generally, and in subtropical cities particularly. Resolution of incongruities between residents' preferred attributes and other stakeholders' main interests has important implications for reshaping lifestyle expectations and design practice as society moves toward a post-carbon future.
Resumo:
This chapter is based on a qualitative case study that researched the perceptions of nine male and female pre-service English teachers’ in regards to their preparedness to mentor positive digital conduct in Social network sites (SNS). These sites enable individuals to perform public representations of identity, consumed by virtual audiences, with various degrees of perceived privacy. The chapter frames what we call “identity curation” through three theoretical lenses; of performativity, customisation and critical literacy. This chapter discusses one of the themes that emerged from the research, which is the way in which “normalised” and naturalised representations of femineity on SNS were judged more harshly than masculine representations.