114 resultados para new technologies and privacy
Resumo:
The Australian Law Reform Commission’s Final Report, Copyright and the Digital Economy, recommends the introduction of a flexible fair use provision. In doing so, it has sought to develop a technology-neutral approach to copyright that is adaptive to new technologies and which promotes innovation.
Resumo:
Presentation by Dr Joe Young, ITS-HPC and Research Support, Managing your research data seminar, 2012
Resumo:
The location of previously unseen and unregistered individuals in complex camera networks from semantic descriptions is a time consuming and often inaccurate process carried out by human operators, or security staff on the ground. To promote the development and evaluation of automated semantic description based localisation systems, we present a new, publicly available, unconstrained 110 sequence database, collected from 6 stationary cameras. Each sequence contains detailed semantic information for a single search subject who appears in the clip (gender, age, height, build, hair and skin colour, clothing type, texture and colour), and between 21 and 290 frames for each clip are annotated with the target subject location (over 11,000 frames are annotated in total). A novel approach for localising a person given a semantic query is also proposed and demonstrated on this database. The proposed approach incorporates clothing colour and type (for clothing worn below the waist), as well as height and build to detect people. A method to assess the quality of candidate regions, as well as a symmetry driven approach to aid in modelling clothing on the lower half of the body, is proposed within this approach. An evaluation on the proposed dataset shows that a relative improvement in localisation accuracy of up to 21 is achieved over the baseline technique.
Resumo:
Introduction and Aim: Sexual assaults commonly involve alcohol use by the perpetrator, victim, or both. Beliefs about alcohol’s effects may impact on people’s perceptions of and responses to men and women who have had such experiences while intoxicated from alcohol. This study aimed to develop an alcohol expectancy scale that captures young adults’ beliefs about alcohol’s role in sexual aggression and victimisation. Design and Methods: Based on pilot focus groups, an initial pool of 135 alcohol expectancy items was developed, checked for readability and face validity, and administered via a cross-sectional survey to 201 male and female university students (18-25 years). Items were specified in terms of three target drinkers: self, men, and women. In addition, a social desirability measure was included. Results: Principal Axis Factoring revealed a 4-factor solution for the targets men and women and a 5-factor solution for the target self with 72 items retained. Factors related to sexual coercion, sexual vulnerability, confidence, self-centredness, and negative cognitive and behavioural effects. Social desirability issues were evident for the target self, but not for the targets men and women. Discussion and Conclusions: Young adults link alcohol’s effects with sexual vulnerabilities via perceived risky cognitions and behaviours. Due to social desirability, these expectancies may be difficult to explicate for the self but may be accessible instead via other-oriented assessment. The Sexual Coercion and Vulnerability Alcohol Expectancy Scale has potential as a tool to elucidate the established tendency for observers to excuse intoxicated sexual perpetrators while blaming intoxicated victims.
Resumo:
The holistic urban experience we perceive when immersed in an urban context is at the heart of urban informatics. This experience encompasses all urban elements such as architecture, people, and culture. Urban informatics explores the possibilities and opportunities created by new technologies and information for enhancing the urban experience. Public transport is an essential urban experience. Everyday, urban dwellers takes public transport to commute and move between different parts of the city. Public transport serves people from all over the city and moves them through different places in the city, using different means of transportation. The nature of public transport—involving people, places, and technologies, makes it a fitting context for urban informatics interventions. There are three main aspects of the public transport experience that can readily benefit from urban informatics interventions the: pragmatic aspect, hedonistic aspect, and social aspect. From the pragmatic perspective, these interventions can help people to be more efficient and effective in taking public transport. Hedonistic-related interventions aim to bring enjoyment and fun to our mundane commute. Finally, urban informatics can strengthen the sense of community in a socially-passive context like public transport environments through adopting socially focused interventions.
Resumo:
An overview of dynamic self-organization phenomena in complex ionized gas systems, associated physical phenomena, and industrial applications is presented. The most recent experimental, theoretical, and modeling efforts to understand the growth mechanisms and dynamics of nano- and micron-sized particles, as well as the unique properties of the plasma-particle systems (colloidal, or complex plasmas) and the associated physical phenomena are reviewed and the major technological applications of micro- and nanoparticles are discussed. Until recently, such particles were considered mostly as a potential hazard for the microelectronic manufacturing and significant efforts were applied to remove them from the processing volume or suppress the gas-phase coagulation. Nowadays, fine clusters and particulates find numerous challenging applications in fundamental science as well as in nanotechnology and other leading high-tech industries.
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.
Resumo:
In this closing chapter the editors review key themes that have emerged through the book. We recognize the varied and dynamic nature of information experience across multiple contexts, and present our own conceptualization of information experience. Finally, we consider possible future directions for information experience research.
Resumo:
Information security and privacy in the healthcare domain is a complex and challenging problem for computer scientists, social scientists, law experts and policy makers. Appropriate healthcare provision requires specialized knowledge, is information intensive and much patient information is of a particularly sensitive nature. Electronic health record systems provide opportunities for information sharing which may enhance healthcare services, for both individuals and populations. However, appropriate information management measures are essential for privacy preservation...
Resumo:
There is little question of the social, cultural and economic importance of video games in the world today, with gaming now rivalling the movie and music sectors as a major leisure industry and pastime. The significance of video games within our everyday lives has certainly been increased and shaped by new technologies and gaming patterns, including the rise of home-based games consoles, advances in mobile telephone technology, the rise in more 'sociable' forms of gaming, and of course the advent of the Internet. This book explores the opportunities, challenges and patterns of gameplay and sociality afforded by the Internet and online gaming. Bringing together a series of original essays from both leading and emerging academics in the field of game studies, many of which employ new empirical work and innovative theoretical approaches to gaming, this book considers key issues crucial to our understanding of online gaming and associated social relations, including: patterns of play, legal and copyright issues, player production, identity construction, gamer communities, communication, patterns of social exclusion and inclusion around religion, gender and disability, and future directions in online gaming.
Resumo:
This thesis deals with the issues of quantifying economic values of coastal and marine ecosystem services and assessing their use in decision-making. The first analytical part of the thesis focuses on estimating non-market use and non-use values, with an application in New-Caledonia using Discrete Choice Experiment. The second part examines how and to what extent the economic valuation of ecosystem services is used in coastal management decision-making with an application in Australia. Using a multi-criteria analysis, the relative importance of ecological, social and economic evaluation criteria is also assessed in the context of coastal development.
Resumo:
This article considers the changes to the Swimming Pools Act 1992 (NSW)(Act) which established a State-wide online register of all private swimming pools in NSW requiring pool owners to register their pools by 19 November 2013. Amendments to the Act introduced changes to the conveyancing and residential tenancy regulations to require vendors and landlords to have a valid Compliance Certificate issued for their swimming pool before offering the property for sale or lease. This article provides a brief overview of the new sale and leasing requirements effective from 29 April 2014, focusing on its application to lot owners within strata and community title schemes and other owners of water front properties with pools on Crown Land Reserves.
Resumo:
Long-term inhalation studies in rodents have presented unequivocal evidence of experimental carcinogenicity of ethylene oxide, based on the formation of malignant tumors at multiple sites. However, despite a considerable body of epidemiological data only limited evidence has been obtained of its carcinogenicity in humans. Ethylene oxide is not only an important exogenous toxicant, but it is also formed from ethylene as a biological precursor. Ethylene is a normal body constituent; its endogenous formation is evidenced by exhalation in rats and in humans. Consequently, ethylene oxide must also be regarded as a physiological compound. The most abundant DNA adduct of ethylene oxide is 7-(2-hydroxyethyl)guanine (HOEtG). Open questions are the nature and role of tissue-specific factors in ethylene oxide carcinogenesis and the physiological and quantitative role of DNA repair mechanisms. The detection of remarkable individual differences in the susceptibility of humans has promoted research into genetic factors that influence the metabolism of ethylene oxide. With this background it appears that current PBPK models for trans-species extrapolation of ethylene oxide toxicity need to be refined further. For a cancer risk assessment at low levels of DNA damage, exposure-related adducts must be discussed in relation to background DNA damage as well as to inter- and intraindividual variability. In rats, subacute ethylene oxide exposures on the order of 1 ppm (1.83 mg/m3) cause DNA adduct levels (HOEtG) of the same magnitude as produced by endogenous ethylene oxide. Based on very recent studies the endogenous background levels of HOEtG in DNA of humans are comparable to those that are produced in rodents by repetitive exogenous ethylene oxide exposures of about 10 ppm (18.3 mg/m3). Experimentally, ethylene oxide has revealed only weak mutagenic effects in vivo, which are confined to higher doses. It has been concluded that long-term human occupational exposure to low airborne concentrations to ethylene oxide, at or below current occupational exposure limits of 1 ppm (1.83 mg/m3), would not produce unacceptable increased genotoxic risks. However, critical questions remain that need further discussions relating to the coherence of animal and human data of experimental data in vitro vs. in vivo and to species-specific dynamics of DNA lesions.
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Resumo:
This research has successfully developed a novel synthetic structural health monitoring system model that is cost-effective and flexible in sensing and data acquisition; and robust in the structural safety evaluation aspect for the purpose of long-term and frequent monitoring of large-scale civil infrastructure during their service lives. Not only did it establish a real-world structural monitoring test-bed right at the heart of QUT Gardens Point Campus but it can also facilitate reliable and prompt protection for any built infrastructure system as well as the user community involved.