441 resultados para privacy violations
Resumo:
Background Domestic violence against women is a major public health problem and violations of women’s human rights. Health professionals could play an important role in screening for the victims. From the evidence to date, it is unclear whether health professionals do play an active role in identification of the victims. Objectives To develop a reliable and valid instrument to measure health professionals’ attitude to identifying female victims of domestic violence. Methods A primary questionnaire was constructed in accordance with established guidelines using the Theory of Planned Behaviour Ajzen (1975) to develop an instrument to measure health professionals’ attitudes in identifying female victim of DV. An expert panel was used to establish content validity. Focus groups amongst a group of health professionals (N = 5) of the target population were performed to confirm face validity. A pilot study (N = 30 nurses and doctors) was undertaken to elicit the feasibility and reliability of the questionnaire. The questionnaire was also administered a second time after one week to check the stability of the tests. Results Feedbacks of the expert panel’s and group discussion confirmed that the questionnaire had the content and face validity. Cronbach’s alpha values for all the items were greater than 0.7. Strong correlations between the direct and indirect measures confirmed that the indirect measures were well constructed. High test-retest correlations confirmed that the measures were reliable in the sense of temporal stability. Significance This tool has the potential to be used by researchers in expanding the knowledge base in this important area.
Resumo:
This thesis investigates the use of fusion techniques and mathematical modelling to increase the robustness of iris recognition systems against iris image quality degradation, pupil size changes and partial occlusion. The proposed techniques improve recognition accuracy and enhance security. They can be further developed for better iris recognition in less constrained environments that do not require user cooperation. A framework to analyse the consistency of different regions of the iris is also developed. This can be applied to improve recognition systems using partial iris images, and cancelable biometric signatures or biometric based cryptography for privacy protection.
Resumo:
Much of the work currently occurring in the field of Quantum Interaction (QI) relies upon Projective Measurement. This is perhaps not optimal, cognitive states are not nearly as well behaved as standard quantum mechanical systems; they exhibit violations of repeatability, and the operators that we use to describe measurements do not appear to be naturally orthogonal in cognitive systems. Here we attempt to map the formalism of Positive Operator Valued Measure (POVM) theory into the domain of semantic memory, showing how it might be used to construct Bell-type inequalities.
Resumo:
Australian Media Law details and explains the complex case law, legislation and regulations governing media practice in areas as diverse as journalism, advertising, multimedia and broadcasting. It examines the issues affecting traditional forms of media such as television, radio, film and newspapers as well as for recent forms such as the internet, online forums and digital technology, in a clear and accessible format. New additions to the fifth edition include: - the implications of new anti-terrorism legislation for journalists; - developments in privacy law, including Law Reform recommendations for a statutory cause of action to protect personal privacy in Australia and the expanding privacy jurisprudence in the United Kingdom and New Zealand; - liability for defamation of internet search engines and service providers; - the High Court decision in Roadshow v iiNet and the position of internet service providers in relation to copyright infringement via their services; - new suppression order regimes; - statutory reforms providing journalists with a rebuttable presumption of non-disclosure when called upon to reveal their sources in a court of law; - recent developments regarding whether journalists can use electronic devices to collect and disseminate information about court proceedings; - contempt committed by jurors via social media; and an examination of recent decisions on defamation, confidentiality, vilification, copyright and contempt.
Resumo:
Process view technology is catching more attentions in modern business process management, as it enables the customisation of business process representation. This capability helps improve the privacy protection, authority control, flexible display, etc., in business process modelling. One of approaches to generate process views is to allow users to construct an aggregate on their underlying processes. However, most aggregation approaches stick to a strong assumption that business processes are always well-structured, which is over strict to BPMN. Aiming to build process views for non-well-structured BPMN processes, this paper investigates the characteristics of BPMN structures, tasks, events, gateways, etc., and proposes a formal process view aggregation approach to facilitate BPMN process view creation. A set of consistency rules and construction rules are defined to regulate the aggregation and guarantee the order preservation, structural and behaviour correctness and a novel aggregation technique, called EP-Fragment, is developed to tackle non-well-structured BPMN processes.
Resumo:
The process view concept deploys a partial and temporal representation to adjust the visible view of a business process according to various perception constraints of users. Process view technology is of practical use for privacy protection and authorization control in process-oriented business management. Owing to complex organizational structure, it is challenging for large companies to accurately specify the diverse perception of different users over business processes. Aiming to tackle this issue, this article presents a role-based process view model to incorporate role dependencies into process view derivation. Compared to existing process view approaches, ours particularly supports runtime updates to the process view perceivable to a user with specific view merging operations, thereby enabling the dynamic tracing of process perception. A series of rules and theorems are established to guarantee the structural consistency and validity of process view transformation. A hypothetical case is conducted to illustrate the feasibility of our approach, and a prototype is developed for the proof-of-concept purpose.
Resumo:
Shared eHealth records systems offer promising benefits for improving healthcare through high availability of information and improved decision making; however, their uptake has been hindered by concerns over the privacy of patient information. To address these privacy concerns while balancing the requirements of healthcare professionals to have access to the information they need to provide appropriate care, the use of an Information Accountability Framework (IAF) has been proposed. For the IAF and so called Accountable-eHealth systems to become a reality, the framework must provide for a diverse range of users and use cases. The initial IAF model did not provide for more diverse use cases including the need for certain users to delegate access to another user in the system to act on their behalf while maintaining accountability. In this paper, we define the requirements for delegation of access in the IAF, how such access policies would be represented in the Framework, and implement and validate an expanded IAF model.
Resumo:
Meaningful use of eHealth, as seen through four key lenses: Usability; Usefulness; Utility; and Safety, is achieved through Accountable-eHealth systems.
Resumo:
Allowing consumers to designate preferred healthcare professionals; Accountable-eHealth systems create a transparent and accountable eHealth environment for better healthcare delivery.
Resumo:
Alcohol is a major factor in road deaths and serious injuries. In Victoria, between 2008 and 2013, 30% of drivers killed were involved in alcohol-related crashes. From the early 1980s Victoria progressively introduced a series of measures, such as driver licence cancellation and alcohol interlocks, to reduce the level of drink-driving on Victoria's roads. This project tracked drink-driving offenders to measure and understand their re-offence and road trauma involvement levels during and after periods of licensing and driving interventions. The methodology controlled for exposure by aggregating crashes and traffic violations within relevant categories (e.g. licence cancelled/relicensed/relicensing not sought) and calculated as rates 'per thousand person-years'. Inferential statistical techniques were used to compare crash and offence rates between control and treatment groups across three distinct time periods, which coincided with the introduction of new interventions. This paper focuses on the extent to which the Victorian drink-driving measures have been successful in reducing re-offending and road trauma involvement during and after periods of licence interventions. It was found that a licence cancellation/ban is an effective drink-driving countermeasure as it reduced drink-driving offending and drink-driving crashes. Interlocks also had a positive effect on drink-driving offences as they were reduced during the interlock period as well as for the entire intervention period. Possible drink-driving policy implications are briefly discussed.
Resumo:
With the introduction of the PCEHR (Personally Controlled Electronic Health Record), the Australian public is being asked to accept greater responsibility for the management of their health information. However, the implementation of the PCEHR has occasioned poor adoption rates underscored by criticism from stakeholders with concerns about transparency, accountability, privacy, confidentiality, governance, and limited capabilities. This study adopts an ethnographic lens to observe how information is created and used during the patient journey and the social factors impacting on the adoption of the PCEHR at the micro-level in order to develop a conceptual model that will encourage the sharing of patient information within the cycle of care. Objective: This study aims to firstly, establish a basic understanding of healthcare professional attitudes toward a national platform for sharing patient summary information in the form of a PCEHR. Secondly, the studies aims to map the flow of patient related information as it traverses a patient’s personal cycle of care. Thus, an ethnographic approach was used to bring a “real world” lens to information flow in a series of case studies in the Australian healthcare system to discover themes and issues that are important from the patient’s perspective. Design: Qualitative study utilising ethnographic case studies. Setting: Case studies were conducted at primary and allied healthcare professionals located in Brisbane Queensland between October 2013 and July 2014. Results: In the first dimension, it was identified that healthcare professionals’ concerns about trust and medico-legal issues related to patient control and information quality, and the lack of clinical value available with the PCEHR emerged as significant barriers to use. The second dimension of the study which attempted to map patient information flow identified information quality issues, clinical workflow inefficiencies and interoperability misconceptions resulting in duplication of effort, unnecessary manual processes, data quality and integrity issues and an over reliance on the understanding and communication skills of the patient. Conclusion: Opportunities for process efficiencies, improved data quality and increased patient safety emerge with the adoption of an appropriate information sharing platform. More importantly, large scale eHealth initiatives must be aligned with the value proposition of individual stakeholders in order to achieve widespread adoption. Leveraging an Australian national eHealth infrastructure and the PCEHR we offer a practical example of a service driven digital ecosystem suitable for co-creating value in healthcare.
Resumo:
Cooperative Intelligent Transportation Systems (C-ITS) allow in-vehicle systems, and ultimately the driver, to enhance their awareness of their surroundings by enabling communication between vehicles and road infrastructure. C-ITS are widely considered as the next major step in driving assistance systems, aiming at increasing safety, comfort and mobility for drivers. However, any communicating systems are subjected to security threats. A key component for providing secure communications at a large scale is a Public Key Infrastructure (PKI). Due to the safety-critical nature of Vehicle-to-Vehicle (V2V) communications, a C-ITS PKI has functional, performance and scalability requirements that differ from traditional non-automotive environments. This paper identifies and defines the key functional and security requirements for C-ITS PKI systems and analyses proposed C-ITS PKI standards against these requirements. In particular, the proposed US and European C-ITS PKI systems are identified as being too complex and not scalable. The paper also highlights various privacy, security and scalability concerns that should be considered for a secure C-ITS PKI solution in the Australian transport landscape.
Resumo:
We consider estimation of mortality rates and growth parameters from length-frequency data of a fish stock and derive the underlying length distribution of the population and the catch when there is individual variability in the von Bertalanffy growth parameter L-infinity. The model is flexible enough to accommodate 1) any recruitment pattern as a function of both time and length, 2) length-specific selectivity, and 3) varying fishing effort over time. The maximum likelihood method gives consistent estimates, provided the underlying distribution for individual variation in growth is correctly specified. Simulation results indicate that our method is reasonably robust to violations in the assumptions. The method is applied to tiger prawn data (Penaeus semisulcatus) to obtain estimates of natural and fishing mortality.
Resumo:
The study explores the relationship between open space design, factors impacting open space provision, and resident satisfaction with open space in multistorey apartment buildings in the context of the subtropical lifestyle and climate of Brisbane Australia. The purpose of the paper is to identify the specific physical and spatial design characteristics residents perceive to be important in open spaces associated with their private dwellings and with shared open spaces. Firsthand resident evaluations of everyday experiences of residing in inner urban high density environments are explored through a survey of 636 residents and interviews with 24 residents. Private balconies are highly valued, but residents’ satisfaction would be enhanced by spaciousness for diverse activities, privacy and climate responsive design. Communal spaces and facilities are used infrequently by many residents who prefer interactions with community outside of the building. This is related to preferences for a level of anonymity in a setting where privacy is difficult to achieve due to physical proximity of neighbours.
Resumo:
Australia's child protection systems and the provision of out-of-home care, in particular, have been subject to sustained criticism for decades from dozens of official inquiries and reviews. It is now well established that many children in state care are treated significantly less well than required by relevant legal frameworks and community standards. Much attention and significant resources have been directed toward trying to ameliorate this ‘wicked problem’ and yet it continues. This article focuses on one reason the problems persists, namely the secrecy and closed cultures that characterize relevant organizations which reinforce strategies of denial that avoid acknowledging or dealing with ‘uncomfortable knowledge’. It is a situation many people in child protection systems confront. It is, for example, when we know abuse is taking place, or when they see or are ourselves party to corrupt or negligent practices. It is knowing that important ethical principles are being abrogated. We draw on recent official reports and inquiries noting the repeated calls for greater transparency and independent oversight. An argument is made for a default position of total transparency subject to caveats that protect privacy and any investigation underway. An account of what this can look like is offered.