390 resultados para access policies

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The full economic, cultural and environmental value of information produced or funded by the public sector can be realised through enabling greater access to and reuse of the information. To do this effectively it is necessary to describe and implement a policy framework that supports greater access and reuse among a distributed, online network of information suppliers and users. The objective of this study was to identify materials dealing with policies, principles and practices relating to information access and reuse in Australia and in other key jurisdictions internationally. Open Access Policies, Practices and Licensing: A review of the literature in Australia and selected jurisdictions sets out the findings of an extensive review of published materials dealing with policies, practices and legal issues relating to information access and reuse, with a particular focus on materials generated, held or funded by public sector bodies. The report was produced as part of the work program of the project “Enabling Real-Time Information Access in Both Urban and Regional Areas”, established within the Cooperative Research Centre for Spatial Information (CRCSI).

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This chapter provides an account of the use of Creative Commons (CC) licensing as a legally and operationally effective means by which governments can implement systems to enable open access to and reuse of their public sector information (PSI). It describes the experience of governments in Australia in applying CC licences to PSI in a context where a vast range of material and information produced, collected, commissioned of funded by government is subject to copyright. By applying CC licences, governments can give effect to their open access policies and create a public domain of PSI which is available for resue by other governmental agencies and the community at large.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The world is increasingly moving towards more open models of publishing and communication. The UK government has demonstrated a firm commitment to ensuring that academic research outputs are made available to all who might benefit from access to them, and its open access policy attempts to make academic publications freely available to readers, rather than being locked behind pay walls or only available to researchers with access to well-funded university libraries. Open access policies have an important role to play in fostering an open innovation ecosystem and ensuring that maximum value is derived from investments in university-based research. But are we ready to embrace this change?

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This chapter analyses the copyright law framework needed to ensure open access to outputs of the Australian academic and research sector such as journal articles and theses. It overviews the new knowledge landscape, the principles of copyright law, the concept of open access to knowledge, the recently developed open content models of copyright licensing and the challenges faced in providing greater access to knowledge and research outputs.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Shared eHealth records systems offer promising benefits for improving healthcare through high availability of information and improved decision making; however, their uptake has been hindered by concerns over the privacy of patient information. To address these privacy concerns while balancing the requirements of healthcare professionals to have access to the information they need to provide appropriate care, the use of an Information Accountability Framework (IAF) has been proposed. For the IAF and so called Accountable-eHealth systems to become a reality, the framework must provide for a diverse range of users and use cases. The initial IAF model did not provide for more diverse use cases including the need for certain users to delegate access to another user in the system to act on their behalf while maintaining accountability. In this paper, we define the requirements for delegation of access in the IAF, how such access policies would be represented in the Framework, and implement and validate an expanded IAF model.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Australian universities are publishing previously unpublished works such as theses in institutional repositories or by publishing scholarly journals on their own presses. This re-invented role of publisher is due in part, to the availability of digital age technologies which scaffold the publishing process and facilitate inexpensive production of digital-only journals. The global push for Open Access to the outputs of publicly-funded research has also been a major driver. Research funder mandates and institutional Open Access policies apply only to publications for which the authors have no expectation of commercial gain. In all cases the primary motivation is to disseminate widely for maximum uptake with attribution to the author thereby increasing impact. This makes works published in institutional repositories and on university presses ideal candidates for Creative Commons licences.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Construction and demolition (C&D) waste have negative impacts on the environment. As a significant proportion of C&D waste is related to the design stage of a project, there is an opportunity for architects to reduce the waste. However, research suggests that many architects often do not understand the impact of their design on waste generation. Training and education are proposed by current researchers to improve architects’ knowledge; however, this has not been adequately validated as a viable approach to solving waste issues. This research investigates architects’ perceptions towards waste management in the design phase, and determines whether they feel they are adequately skilled in reducing C&D waste. Questionnaire surveys were distributed to architects from 98 architectural firms and 25 completed surveys were returned. The results show that while architects are aware of the relationship between design and waste, ‘extra time’ and ‘lack of knowledge’ are the key barriers to implementing waste reduction strategies. In addition, the majority of respondents acknowledge their lack of skill to reduce waste through design evaluation. Therefore, training programmes can be a viable strategy to enable them to address the pressing issue of C&D waste reduction.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Australia has been populated for more than 40,000 years with Indigenous Australians joined by European settlers only 230 years ago. The first settlers consisted of convicts from more than 28 countries and members of the British army who arrived in 1788 to establish a British penal colony. Mass migration in the nineteenth century with one and a half million immigrants from Europe, principally from the United Kingdom and Ireland (Haines and Shlomowitz, 1992), established the continent as an Anglo society in the Pacific. In the twentieth century immigrants came from many European countries and in the latter decades from many parts of Asia and the Middle East (Collins, 1991, pp.10-13). In the 21st century Australia has an ethnically and culturally diverse population. The original Indigenous population of Australia accounts for approximately 460,000 or 2.5 per cent of the total population (ABS, 2006a). Estimates are that around 4.5m. persons in the population (close to 20 per cent), were born outside Australia with the majority of these arriving from Europe, principally the United Kingdom, and New Zealand (ABS, 2006b). Like many other countries, Australia has a legacy of discrimination and inequality in employment. Propelled by racist ideologies and the male breadwinner ideology, Indigenous Australians, and non-European immigrants, and women were barred from certain jobs and paid less for their work than any white male counterpart. These conditions were legally sanctioned through the industrial relations system and other laws in the nineteenth and first half of the twentieth century. Since the 1960s a dramatic change has occurred in social policy and national legislation and Australia today has an extensive array of laws which forbid employment discrimination on race, ethnicity, gender and many other characteristics, and other approaches which promote proactive organizational plans and actions to achieve equity in employment. This chapter outlines these developments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Current regulatory requirements on data privacy make it increasingly important for enterprises to be able to verify and audit their compliance with their privacy policies. Traditionally, a privacy policy is written in a natural language. Such policies inherit the potential ambiguity, inconsistency and mis-interpretation of natural text. Hence, formal languages are emerging to allow a precise specification of enforceable privacy policies that can be verified. The EP3P language is one such formal language. An EP3P privacy policy of an enterprise consists of many rules. Given the semantics of the language, there may exist some rules in the ruleset which can never be used, these rules are referred to as redundant rules. Redundancies adversely affect privacy policies in several ways. Firstly, redundant rules reduce the efficiency of operations on privacy policies. Secondly, they may misdirect the policy auditor when determining the outcome of a policy. Therefore, in order to address these deficiencies it is important to identify and resolve redundancies. This thesis introduces the concept of minimal privacy policy - a policy that is free of redundancy. The essential component for maintaining the minimality of privacy policies is to determine the effects of the rules on each other. Hence, redundancy detection and resolution frameworks are proposed. Pair-wise redundancy detection is the central concept in these frameworks and it suggests a pair-wise comparison of the rules in order to detect redundancies. In addition, the thesis introduces a policy management tool that assists policy auditors in performing several operations on an EP3P privacy policy while maintaining its minimality. Formal results comparing alternative notions of redundancy, and how this would affect the tool, are also presented.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that protects private data through the enforcement of licenses provided by consumers. Prior to supplying data, data owners are expected to construct a detailed license for the potential data users. A license specifies whom, under what conditions, may have what type of access to the protected data. The specification of a license by a data owner binds the enterprise data handling to the consumer’s privacy preferences. However, licenses are very detailed, may reveal the internal structure of the enterprise and need to be kept synchronous with the enterprise privacy policy. To deal with this, we employ the Platform for Privacy Preferences Language (P3P) to communicate enterprise privacy policies to consumers and enable them to easily construct data licenses. A P3P policy is more abstract than a license, allows data owners to specify the purposes for which data are being collected and directly reflects the privacy policy of an enterprise.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We define a semantic model for purpose, based on which purpose-based privacy policies can be meaningfully expressed and enforced in a business system. The model is based on the intuition that the purpose of an action is determined by its situation among other inter-related actions. Actions and their relationships can be modeled in the form of an action graph which is based on the business processes in a system. Accordingly, a modal logic and the corresponding model checking algorithm are developed for formal expression of purpose-based policies and verifying whether a particular system complies with them. It is also shown through various examples, how various typical purpose-based policies as well as some new policy types can be expressed and checked using our model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Privacy issues have hindered the evolution of e-health since its emergence. Patients demand better solutions for the protection of private information. Health professionals demand open access to patient health records. Existing e-health systems find it difficult to fulfill these competing requirements. In this paper, we present an information accountability framework (IAF) for e-health systems. The IAF is intended to address privacy issues and their competing concerns related to e-health. Capabilities of the IAF adhere to information accountability principles and e-health requirements. Policy representation and policy reasoning are key capabilities introduced in the IAF. We investigate how these capabilities are feasible using Semantic Web technologies. We discuss with the use of a case scenario, how we can represent the different types of policies in the IAF using the Open Digital Rights Language (ODRL).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security and privacy in electronic health record systems have been hindering the growth of e-health systems since their emergence. The development of policies that satisfy the security and privacy requirements of different stakeholders in healthcare has proven to be difficult. But, these requirements have to be met if the systems developed are to succeed in achieving their intended goals. Access control is a fundamental security barrier for securing data in healthcare information systems. In this paper we present an access control model for electronic health records. We address patient privacy requirements, confidentiality of private information and the need for flexible access for health professionals for electronic health records. We carefully combine three existing access control models and present a novel access control model for EHRs which satisfies requirements of electronic health records.