363 resultados para privacy


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australia's child protection systems and the provision of out-of-home care, in particular, have been subject to sustained criticism for decades from dozens of official inquiries and reviews. It is now well established that many children in state care are treated significantly less well than required by relevant legal frameworks and community standards. Much attention and significant resources have been directed toward trying to ameliorate this ‘wicked problem’ and yet it continues. This article focuses on one reason the problems persists, namely the secrecy and closed cultures that characterize relevant organizations which reinforce strategies of denial that avoid acknowledging or dealing with ‘uncomfortable knowledge’. It is a situation many people in child protection systems confront. It is, for example, when we know abuse is taking place, or when they see or are ourselves party to corrupt or negligent practices. It is knowing that important ethical principles are being abrogated. We draw on recent official reports and inquiries noting the repeated calls for greater transparency and independent oversight. An argument is made for a default position of total transparency subject to caveats that protect privacy and any investigation underway. An account of what this can look like is offered.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Content delivery networks (CDNs) are an essential component of modern website infrastructures: edge servers located closer to users cache content, increasing robustness and capacity while decreasing latency. However, this situation becomes complicated for HTTPS content that is to be delivered using the Transport Layer Security (TLS) protocol: the edge server must be able to carry out TLS handshakes for the cached domain. Most commercial CDNs require that the domain owner give their certificate's private key to the CDN's edge server or abandon caching of HTTPS content entirely. We examine the security and performance of a recently commercialized delegation technique in which the domain owner retains possession of their private key and splits the TLS state machine geographically with the edge server using a private key proxy service. This allows the domain owner to limit the amount of trust given to the edge server while maintaining the benefits of CDN caching. On the performance front, we find that latency is slightly worse compared to the insecure approach, but still significantly better than the domain owner serving the content directly. On the security front, we enumerate the security goals for TLS handshake proxying and identify a subtle difference between the security of RSA key transport and signed-Diffie--Hellman in TLS handshake proxying; we also discuss timing side channel resistance of the key server and the effect of TLS session resumption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Taking an interdisciplinary approach unmatched by any other book on this topic, this thoughtful Handbook considers the international struggle to provide for proper and just protection of Indigenous intellectual property (IP). In light of the United Nations Declaration on the Rights of Indigenous Peoples 2007, expert contributors assess the legal and policy controversies over Indigenous knowledge in the fields of international law, copyright law, trademark law, patent law, trade secrets law, and cultural heritage. The overarching discussion examines national developments in Indigenous IP in the United States, Canada, South Africa, the European Union, Australia, New Zealand, and Indonesia. The Handbook provides a comprehensive overview of the historical origins of conflict over Indigenous knowledge, and examines new challenges to Indigenous IP from emerging developments in information technology, biotechnology, and climate change. Practitioners and scholars in the field of IP will learn a great deal from this Handbook about the issues and challenges that surround just protection of a variety of forms of IP for Indigenous communities. Preface The Legacy of David Unaipon Matthew Rimmer Introduction: Mapping Indigenous Intellectual Property Matthew Rimmer PART I INTERNATIONAL LAW 1. The United Nations Declaration on the Rights of Indigenous Peoples: A Human Rights Framework for Indigenous Intellectual Property Mauro Barelli 2. The WTO, The TRIPS Agreement and Traditional Knowledge Tania Voon 3. The World Intellectual Property Organization and Traditional Knowledge Sara Bannerman 4. The World Indigenous Network: Rio+20, Intellectual Property, Indigenous Knowledge, and Sustainable Development Matthew Rimmer PART II COPYRIGHT LAW AND RELATED RIGHTS 5. Government Man, Government Painting? David Malangi and the 1966 One-Dollar Note Stephen Gray 6. What Wandjuk Wanted Martin Hardie 7. Avatar Dreaming: Indigenous Cultural Protocols and Making Films Using Indigenous Content Terri Janke 8. The Australian Resale Royalty for Visual Artists: Indigenous Art and Social Justice Robert Dearn and Matthew Rimmer PART III TRADE MARK LAW AND RELATED RIGHTS 9. Indigenous Cultural Expression and Registered Designs Maree Sainsbury 10. The Indian Arts and Crafts Act: The Limits of Trademark Analogies Rebecca Tushnet 11. Protection of Traditional Cultural Expressions within the New Zealand Intellectual Property Framework: A Case Study of the Ka Mate Haka Sarah Rosanowski 12 Geographical Indications and Indigenous Intellectual Property William van Caenegem PART IV PATENT LAW AND RELATED RIGHTS 13. Pressuring ‘Suspect Orthodoxy’: Traditional Knowledge and the Patent System Chidi Oguamanam, 14. The Nagoya Protocol: Unfinished Business Remains Unfinished Achmad Gusman Siswandi 15. Legislating on Biopiracy in Europe: Too Little, too Late? Angela Daly 16. Intellectual Property, Indigenous Knowledge, and Climate Change Matthew Rimmer PART V PRIVACY LAW AND IDENTITY RIGHTS 17. Confidential Information and Anthropology: Indigenous Knowledge and the Digital Economy Sarah Holcombe 18. Indigenous Cultural Heritage in Australia: The Control of Living Heritages Judith Bannister 19. Dignity, Trust and Identity: Private Spheres and Indigenous Intellectual Property Bruce Baer Arnold 20. Racial Discrimination Laws as a Means of Protecting Collective Reputation and Identity David Rolph PART VI INDIGENOUS INTELLECTUAL PROPERTY: REGIONAL PERSPECTIVES 21. Diluted Control: A Critical Analysis of the WAI262 Report on Maori Traditional Knowledge and Culture Fleur Adcock 22. Traditional Knowledge Governance Challenges in Canada Jeremy de Beer and Daniel Dylan 23. Intellectual Property protection of Traditional Knowledge and Access to Knowledge in South Africa Caroline Ncube 24. Traditional Knowledge Sovereignty: The Fundamental Role of Customary Law in Protection of Traditional Knowledge Brendan Tobin Index

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: The first phase of the Queensland Pharmacist Immunisation Pilot (QPIP) ran between April and August 2014, to pilot pharmacists administering influenza vaccinations for the flu season for the first time in Australia. Aim: An aim was to investigate factors facilitating implementation of a pharmacist vaccination service in the community pharmacy setting. Method: The QPIP pharmacies were divided into two arms; the South East Queensland arm consisting of 51 Terry White Chemists (TWCs), and 29 pharmacies in the North Queensland (NQ) arm. The TWCs featured pharmacies which previously provided a vaccination service and that were experienced with using an online booking system, providing an opportunity to capture booking data. Results: The TWCs delivered 9902 (90%) of the influenza vaccinations in QPIP. Of these, 48.5% of the vaccines were delivered via appointments made using the online booking system, while 13.3% were in-store bookings. Over one-third (38.2%) of the vaccinations delivered in were “walk-ins” where the vaccination was delivered ‘on the spot’ as spontaneous or opportunistic vaccinations. The absence of a booking system meant all vaccinations delivered in the NQ arm were “walk-ins”. The online-booking data showed 10:00 am and Tuesday being the most popular time and day for vaccinations. Patients preferred having their vaccinations in private consultation rooms, over areas which used a screen to partition off a private area. Discussion: The presence of an online booking system appeared to increase the efficiency and penetration of the of vaccine service delivery. Also, as the level of privacy afforded to patients increased, the number of patients vaccinated also increased. Conclusions: As pharmacist-delivered vaccination services start to progressively roll out across Australia; these findings pave the way for more efficient and effective implementation of the service.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The results of the pilot demonstrated that a pharmacist delivered vaccinations services is feasible in community pharmacy and is safe and effective. The accessibility of the pharmacist across the influenza season provided the opportunity for more people to be vaccinated, particularly those who had never received an influenza vaccine before. Patient satisfaction was extremely high with nearly all patients happy to recommend the service and to return again next year. Factors critical to the success of the service were: 1. Appropriate facilities 2. Competent pharmacists 3. Practice and decision support tools 4. In-­‐store implementation support We demonstrated in the pilot that vaccination recipients preferred a private consultation area. As the level of privacy afforded to the patients increased (private room vs. booth), so did the numbers of patients vaccinated. We would therefore recommend that the minimum standard of a private consultation room or closed-­‐in booth, with adequate space for multiple chairs and a work / consultation table be considered for provision of any vaccination services. The booth or consultation room should be used exclusively for delivering patient services and should not contain other general office equipment, nor be used as storage for stock. The pilot also demonstrated that a pharmacist-­‐specific training program produced competent and confident vaccinators and that this program can be used to retrofit the profession with these skills. As vaccination is within the scope of pharmacist practice as defined by the Pharmacy Board of Australia, there is potential for the universities to train their undergraduates with this skill and provide a pharmacist vaccination workforce in the near future. It is therefore essential to explore appropriate changes to the legislation to facilitate pharmacists’ practice in this area. Given the level of pharmacology and medicines knowledge of pharmacists, combined with their new competency of providing vaccinations through administering injections, it is reasonable to explore additional vaccines that pharmacists could administer in the community setting. At the time of writing, QPIP has already expanded into Phase 2, to explore pharmacists vaccinating for whooping cough and measles. Looking at the international experience of pharmacist delivered vaccination, we would recommend considering expansion to other vaccinations in the future including travel vaccinations, HPV and selected vaccinations to those under the age of 18 years. Overall the results of the QPIP implementation have demonstrated that an appropriately trained pharmacist can deliver safely and effectively influenza vaccinations to adult patients in the community. The QPIP showed the value that the accessibility of pharmacists brings to public health outcomes through improved access to vaccinations and the ability to increase immunisation rates in the general population. Over time with the expansion of pharmacist vaccination services this will help to achieve more effective herd immunity for some of the many diseases which currently have suboptimal immunisation rates.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

DNA evidence has made a significant contribution to criminal investigations in Australia and around the world since it was widely adopted in the 1990s (Gans & Urbas 2002). The direct matching of DNA profiles, such as comparing one obtained from a crime scene with one obtained from a suspect or database, remains a widely used technique in criminal investigations. A range of new DNA profiling techniques continues to be developed and applied in criminal investigations around the world (Smith & Urbas 2012). This paper is the third in a series by the Australian Institute of Criminology (AIC) on DNA evidence. The first, published in 1990 when the technology was in its relative infancy, outlined the scientific background for DNA evidence, considered early issues such as scientific reliability and privacy and described its application in early criminal cases (Easteal & Easteal 1990). The second, published in 2002, expanded on the scientific background and discussed a significant number of Australian cases in a 12-year period, illustrating issues that had arisen in investigations, at trial and in the use of DNA in the review of convictions and acquittals (Gans & Urbas 2002). There have been some significant developments in the science and technology behind DNA evidence in the 13 years since 2002 that have important implications for law enforcement and the legal system. These are discussed through a review of relevant legal cases and the latest empirical evidence. This paper is structured in three sections. The first examines the scientific techniques and how they have been applied in police investigations, drawing on a number of recent cases to illustrate them. The second considers empirical research evaluating DNA evidence and databases and the impact DNA has on investigative and court outcomes. The final section discusses significant cases that establish legal precedent relating to DNA evidence in criminal trials where significant issues have arisen or new techniques have been applied that have not yet been widely discussed in the literature. The paper concludes by reflecting on implications for policy and practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper provides a first look at the acceptance of Accountable-eHealth (AeH) systems–a new genre of eHealth systems designed to manage information privacy concerns that hinder the proliferation of eHealth. The underlying concept of AeH systems is appropriate use of information through after-the-fact accountability for intentional misuse of information by healthcare professionals. An online questionnaire survey was utilised for data collection from three educational institutions in Queensland, Australia. A total of 23 hypotheses relating to 9 constructs were tested using a structural equation modelling technique. The moderation effects on the hypotheses were also tested based on six moderation factors to understand their role on the designed research model. A total of 334 valid responses were received. The cohort consisted of medical, nursing and other health related students studying at various levels in both undergraduate and postgraduate courses. Hypothesis testing provided sufficient data to accept 7 hypotheses. The empirical research model developed was capable of predicting 47.3% of healthcare professionals’ perceived intention to use AeH systems. All six moderation factors showed significant influence on the research model. A validation of this model with a wider survey cohort is recommended as a future study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The last time a peer-reviewed volume on the future of mental health facilities was produced was in 1959, following a symposium organised by the American Psychological Association. The consensus was easy enough to follow and still resonates today: the best spaces to treat psychiatric illness will be in smaller, less restrictive units that offer more privacy and allow greater personalisation of space – possibly a converted hotel (Goshen, 1959). In some way, all those ideals have come to pass. An ideal typology was never established, but even so, units have shrunk from thousands of beds to units that typically house no more than 50 patients. Patients are generally more independent and are free to wander (within a unit) as they please. But the trend toward smaller and freer is reversing. This change is not driven by a desire to find the ideal building nor better models of care, but by growing concerns about budgets, self-harm and psychiatric violence. This issue of the Facilities comes at a time when the healthcare design is increasingly dominated by codes, statutes and guidelines. But the articles herein are a call to stop and think. We are not at the point where guidelines can be helpful, because they do not embody any depth of knowledge nor wisdom. These articles are intended to inject some new research on psychiatric/environmental interactions and also to remind planners and managers that guidelines might not tackle a core misunderstanding: fear-management about patient safety and the safety of society is not the purpose of the psychiatric facility. It is purpose is to create spaces that are suitable for improving the well-being of the mentally ill.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study examined factors (e.g., ad values and social networking advertising characteristics) influencing consumers' attitudes and behavioural intention towards three types of social networking advertising (SNA) on Facebook – home page ad, social impression ad, and organic impression ad. Findings demonstrate that peer influence had the most significant impacts on attitude and behavioural intention across all types of SNA. The significant interaction term of invasiveness and privacy concern indicates that both attitude and behavioural intention were diminished, particularly when perceived invasiveness and privacy concern were high simultaneously. In addition, results suggest that attitudes towards the ad played a mediating role between SNA characteristics and behavioural intention. Lastly, among the types of SNA, consumers preferred organic impression ads that featured friends' names on their newsfeed more than paid ads located on the sidebar of their Facebook pages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Additive manufacturing or ‘3D printing’ has emerged into the mainstream in the last few years, with much hype about its revolutionary potential as the latest ‘disruptive technology’ to destroy existing business models, empower individuals and evade any kind of government control. This book examines the trajectory of 3D printing in practice and how it interacts with various areas of law, including intellectual property, product liability, gun laws, data privacy and fundamental/constitutional rights. A particular comparison is made between 3D printing and the Internet as this has been, legally-speaking, another ‘disruptive technology’ and also one on which 3D printing is partially dependent. This book is the first expert analysis of 3D printing from a legal perspective and provides a critical assessment of the extent to which existing legal regimes can be successfully applied to, and enforced vis-à-vis, 3D printing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Tax Transparency Package released by the European Commission last week comes amid global moves by the G20 and others to make it more difficult for companies to avoid paying their fair share of tax. But as serious information sharing plans are hammered out between nations around the world, the Australian government is considering protecting the privacy of some of Australia’s richest people, diluting transparency measures aimed at private companies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper asks a new question: how we can use RFID technology in marketing products in supermarkets and how we can measure its performance or ROI (Return-on-Investment). We try to answer the question by proposing a simulation model whereby customers become aware of other customers' real-time shopping behavior and may hence be influenced by their purchases and the levels of purchases. The proposed model is orthogonal to sales model and can have the similar effects: increase in the overall shopping volume. Managers often struggle with the prediction of ROI on purchasing such a technology, this simulation sets to provide them the answers of questions like the percentage of increase in sales given real-time purchase information to other customers. The simulation is also flexible to incorporate any given model of customers' behavior tailored to particular supermarket, settings, events or promotions. The results, although preliminary, are promising to use RFID technology for marketing products in supermarkets and provide several dimensions to look for influencing customers via feedback, real-time marketing, target advertisement and on-demand promotions. Several other parameters have been discussed including the herd behavior, fake customers, privacy, and optimality of sales-price margin and the ROI of investing in RFID technology for marketing purposes. © 2010 Springer Science+Business Media B.V.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Human age is surrounded by assumed set of rules and behaviors imposed by local culture and the society they live in. This paper introduces software that counts the presence of a person on the Internet and examines the activities he/she conducts online. The paper answers questions such as how "old" are you on the Internet? How soon will a newbie be exposed to adult websites? How long will it take for a new Internet user to know about social networking sites? And how many years a user has to surf online to celebrate his/her first "birthday" of Internet presence? Paper findings from a database of 105 school and university students containing their every click of first 24 hours of Internet usage are presented. The findings provide valuable insights for Internet Marketing, ethics, Internet business and the mapping of Internet life with real life. Privacy and ethical issues related to the study have been discussed at the end. © Springer Science+Business Media B.V. 2010.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

ARTIST STATEMENT VIBRANTe 2.0 was inspired by a research project for Parkinson’s disease patients aimed at developing a wearable device to collect relevant data for patients and medical health professionals. Vibrante is a Spanish word that translates to vibrant; literally meaning shaking or vibrations. Vibrante also has a dual meaning including vibrancy, energy, activity, and liveliness. Parkinson’s can be a debilitating disease, but it does not mean the person has to lose energy, activeness or vibrancy. As technology moves from being worn to becoming implantable and completely hidden within the body, the very notion of its physicality becomes difficult to grasp. While the human body hides implantable technology, VIBRANTe 2.0 intentionally hides the human body by making it invisible to reveal the technology stitched within. Wires become veins, delivering lifeblood to the technology inside, allowing it to pulsate and exist, while motherboards become networked hubs by which information is transferred through and within the body, performing functions that mirror and often surpass human performance capabilities. Ultimately, VIBRANTe 2.0 seeks to prompt the viewer to reflect on the potential ramifications of the complete immersion of technology into the human body. CONTEXT Technology is increasingly penetrating all aspects of our environment, and the rapid uptake of devices that live near, on or in our bodies is facilitating radical new ways of working, relating and socialising. Such technology, with its capacity to generate previously unimaginable levels of data, offers the potential to provide life-augmenting levels of interactivity. However, the absorption of technology into the very fabric of clothes, accessories and even bodies begins to dilute boundaries between physical, technological and social spheres, generating genuine ethical and privacy concerns and potentially having implications for human evolution. Embedding technology into the fabric of our clothes, accessories, and even the body enable the acquisition of and the connection to vast amounts of data about people and environments in order to provide life-augmenting levels of interactivity. Wearable sensors for example, offer the potential for significant benefits in the future management of our wellbeing. Fitness trackers such as ‘Fitbit’ and ‘Garmen’ provide wearers with the ability to monitor their personal fitness indicators while other wearables provide healthcare professionals with information that improves diagnosis and observation of medical conditions. This exhibition aimed to illustrate this shifting landscape through a selection of experimental wearable and interactive works by local, national and international artists and designers. The exhibition will also provide a platform for broader debate around wearable technology, our mediated future-selves and human interactions in this future landscape. EXHIBITION As part of Artisan’s Wearnext exhibition, the work was on public display from 25 July to 7 November 2015 and received the following media coverage: [Please refer to Additional URLs]