9 resultados para pseudonym

em Queensland University of Technology - ePrints Archive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the quality of healthcare while at the same time decreasing its cost. Doing so will require federating the large number of patient data repositories currently in use throughout the country. However, implementation of EHR systems is being hindered by several obstacles, among them concerns about data privacy and trustworthiness. Current IT solutions fail to satisfy patients’ privacy desires and do not provide a trustworthiness measure for medical data. This thesis starts with the observation that existing EHR system proposals suer from six serious shortcomings that aect patients’ privacy and safety, and medical practitioners’ trust in EHR data: accuracy and privacy concerns over linking patients’ existing medical records; the inability of patients to have control over who accesses their private data; the inability to protect against inferences about patients’ sensitive data; the lack of a mechanism for evaluating the trustworthiness of medical data; and the failure of current healthcare workflow processes to capture and enforce patient’s privacy desires. Following an action research method, this thesis addresses the above shortcomings by firstly proposing an architecture for linking electronic medical records in an accurate and private way where patients are given control over what information can be revealed about them. This is accomplished by extending the structure and protocols introduced in federated identity management to link a patient’s EHR to his existing medical records by using pseudonym identifiers. Secondly, a privacy-aware access control model is developed to satisfy patients’ privacy requirements. The model is developed by integrating three standard access control models in a way that gives patients access control over their private data and ensures that legitimate uses of EHRs are not hindered. Thirdly, a probabilistic approach for detecting and restricting inference channels resulting from publicly-available medical data is developed to guard against indirect accesses to a patient’s private data. This approach is based upon a Bayesian network and the causal probabilistic relations that exist between medical data fields. The resulting definitions and algorithms show how an inference channel can be detected and restricted to satisfy patients’ expressed privacy goals. Fourthly, a medical data trustworthiness assessment model is developed to evaluate the quality of medical data by assessing the trustworthiness of its sources (e.g. a healthcare provider or medical practitioner). In this model, Beta and Dirichlet reputation systems are used to collect reputation scores about medical data sources and these are used to compute the trustworthiness of medical data via subjective logic. Finally, an extension is made to healthcare workflow management processes to capture and enforce patients’ privacy policies. This is accomplished by developing a conceptual model that introduces new workflow notions to make the workflow management system aware of a patient’s privacy requirements. These extensions are then implemented in the YAWL workflow management system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Early childhood teacher education programs have a responsibility, amongst many, to prepare teachers for decision-making on real world issues, such as child abuse and neglect. Their repertoire of skills can be enhanced by engaging with others, either face-to-face or online, in authentic problem-based learning. This paper draws on a study of early childhood student teachers who engaged in an authentic learning experience, which was to consider and to suggest how they would act upon a real-life case of child abuse encountered in an early childhood classroom in Queensland. This was the case of Toby (a pseudonym), who was suspected of being physically abused at home. Students drew upon relevant legislation, policy and resource materials to tackle Toby’s case. The paper provides evidence of students grappling with the complexity of a child abuse case and establishing, through collaboration with others, a proactive course of action. The paper has a dual focus. First, it discusses the pedagogical context in which early childhood student teachers deal with issues of child abuse and neglect in the course of their teacher education program. Second, it examines evidence of students engaging in collaborative problem-solving around issues of child abuse and neglect and teachers’ responsibilities, both legal and professional, to the children and families they work with. Early childhood policy-makers, practitioners and teacher educators are challenged to consider how early childhood teachers are best equipped to deal with child protection and early intervention.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines and compares two stories, the novel Helen Fleetwood (Elizabeth, 1841) and the film China Blue (Teddy Bear Films, 2005), in relation to the Ethical Fashion movement. In 2005, more than 50 designers from around the world took part in The Ethical Fashion Show in Paris. This movement dictates that designers ensure that their garments are produced in an ethical manner, rather than support the ‘sweatshop’ environments of some industrialists determined to make a profit at the expense of workers rights. The momentum of the Ethical Fashion movement suggests that it is possible for fashion to be ethical, desirable and profitable in the 21st century. In 1841, after extensive research, Charlotte Elizabeth Tonna (using the pseudonym Charlotte Elizabeth) began to write about the atrocities of the factory system in industrialised England. Her novel, Helen Fleetwood, is one of the earliest examples of this kind of work, providing the reader with an extensive insight into the life of English factory workers in the mid-19th century. The story is about the Widow Green and her orphan dependents who are led, through circumstance, to leave their rural home and take up employment in the cotton mills of Manchester, with the hope of having an independent existence. Instead they discover the realities of factory life – extremely long hours, unsafe conditions, poor wages and a steady decline into extreme poverty. In his film China Blue (Teddy Bear Films, 2005), director Micha X. Peled tells an alarmingly similar tale set in 21st century China. This ‘docu-drama’ (a recreation from actual interviews and diary entries) tells the story of ‘Little Jasmine’ who leaves her family’s farm to pursue an independent life in Southern China’s manufacturing district. It is not long before the realities of modern factory life are revealed to the teenage ‘heroine’ – crowded dormitories, long working hours, arbitrary fines and wages that do not compare with those of workers in the Western world. While much of the human story remains unchanged, there have been significant improvements in technology and safety in the last 165 years that result in the reality that not all clothing manufacture is performed in ‘sweatshop’ conditions. After a recent visit to a manufacturing plant in China, consultation with peers in the industry and having worked in the Australian fashion industry for many years, the author compares these stories with her own experiences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent research from within a neo-Piagetian perspective proposes that novice programmers pass through the sensorimotor and preoperational stages before being able to reason at the concrete operational stage. However, academics traditionally teach and assess introductory programming as if students commence at the concrete operational stage. In this paper, we present results from a series of think aloud sessions with a single student, known by the pseudonym “Donald”. We conducted the sessions mainly over one semester, with an additional session three semesters later. Donald first manifested predominately sensorimotor reasoning, followed by preoperational reasoning, and finally concrete operational reasoning. This longitudinal think aloud study of Donald is the first direct observational evidence of a novice programmer progressing through the neo-Piagetian stages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudonym can interact with an unknown entity and be confident that his/her identity is secret even if the other entity is dishonest. In this work, we present a system that allows users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Our proposal is different from previously published pseudonym systems, as in addition to standard notion of protecting privacy of an user, our system offers colligation between seemingly independent pseudonyms. This new property when combined with a trusted platform that stores a master secret key is extremely beneficial to an user as it offers a convenient way to generate a large number of pseudonyms using relatively small storage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters to both first and second price (Vickrey) auctions and provides full price flexibility. Both computational and communication cost are linear with the number of bidders and utilize only standard cryptographic primitives. The protocol strictly divides knowledge of the bidder's identity and their actual bids between, respectively, a registration authority and an auctioneer, who are assumed not to collude but may be separately corrupt. This assures strong bidder-anonymity, though only weak bid privacy. The protocol is structured in two phases, each involving only off-line communication. Registration, requiring the use of the public key infrastructure, is simultaneous with hash-sealed bid-commitment and generates a receipt to the bidder containing a pseudonym. This phase is followed by encrypted bid-submission. Both phases involve the registration authority acting as a communication conduit but the actual message size is quite small. It is argued that this structure guarantees non-repudiation by both the winner and the auctioneer. Second price correctness is enforced either by observing the absence of registration of the claimed second-price bid or, where registered but lower than the actual second price, is subject to cooperation by the second price bidder - presumably motivated through self-interest. The use of the registration authority in other contexts is also considered with a view to developing an architecture for efficient secure multiparty transactions

Relevância:

10.00% 10.00%

Publicador:

Resumo:

2 x 2.5 metre text based wall painting with a hidden automatic air freshener timed to spray every 60 seconds. The work formed part of a group exhibition that dealt with Humour,Politics and Art. It was part of a series of ongoing works made under the pseudonym Eve Roleston. Roleston is part of a trio of pseudonyms I use, the others being Ernesto Love, and Ernest Olove, to explore the research potential of the fictocritical in a visual arts practice.This forms part of an ongoing body of practice-led research undertaken in my PhD dealing with reconfiguring the relationship between art and politics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Eleanor Smith [pseudonym], teacher : I was talking to the kids about MacDonalds*/I forget exactly what the context was*/I said ‘‘ah, the Americans call them French fries, and, you know, MacDonalds is an American chain and they call them French fries because the Americans call them French fries’’, and this little Australian kid in the front row, very Australian child, said to me, ‘‘I call them French fries!’’ . . . Um, a fourth grade boy whom I taught in 1993 at this school, the world basketball championships were on . . . Americans were playing their dream machine and the Boomers were up against them . . . and, ah, this boy was very interested in basketball . . . but it’s not in my blood, not in the way cricket is for example . . . Um, Um, and I said to this fellow, ‘‘um, well’’, I said, ‘‘Australia’s up against Dream Machine tomorrow’’. He [Jason, pseudonym] said, ‘‘Ah, you know, Boomers probably won’t win’’. . . . I said, ‘‘Well that’s sport, mate’’. I said, ‘‘You never know in sport. Australia might win’’. And he looked at me and he said, ‘‘I’m not going for Australia, I’m going for America’’. This is from an Australian boy! And I thought so strong is the hype, so strong is the, is the, power of the media, etc., that this boy is not [pause], I can’t tell you how outraged I was. Here’s me as an Australian and I don’t even support basketball, it’s not even my sport, um, but that he would respond like that because of the power of the American machine that’s converting kids’ minds, the way they think, where they’re putting their loyalties, etc. I was just appalled, but that’s where he was. And when I asked kids for their favourite place, he said Los Angeles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Australia, the decision to home educate is becoming increasingly popular (cf. Townsend, 2012). In spite of its increasing popularity, the reasons home education is chosen by Australian families is under-researched (cf. Jackson & Allan, 2010). In addition, the decision to home educate among minority groups, such as Australian Muslim families, is absent from the literature. This paper reports on an interview with one Muslim mother who chose to home educate her children. An in-depth, qualitative interview was conducted with Aaishah (pseudonym), a mother who lived in one of Australia’s most populated cities. Data were analysed using the Discourse Historical Approach to Critical Discourse Analysis. The analysis revealed that there were similarities between the discourses of Christian parents described in the literature, in terms of the reasons Aaishah had given for her decision to home educate. In particular, analysis reveals Aaishah’s fears about schools, their negative experiences on her children and her hopes for her children’s futures.