3 resultados para Public interest based and private interest based systems

em DRUM (Digital Repository at the University of Maryland)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

While technologies for genetic sequencing have increased the promise of personalized medicine, they simultaneously pose threats to personal privacy. The public’s desire to protect itself from unauthorized access to information may limit the uses of this valuable resource. To date, there is limited understanding about the public’s attitudes toward the regulation and sharing of such information. We sought to understand the drivers of individuals’ decisions to disclose genetic information to a third party in a setting where disclosure potentially creates both private and social benefits, but also carries the risk of potential misuse of private information. We conducted two separate but related studies. First, we administered surveys to college students and parents, to determine individual attitudes toward and inter-generational influences on the disclosure decision. Second, we conducted a game-theory based experiment that assessed how participants’ decisions to disclose genetic information are influenced by societal and health factors. Key survey findings indicate that concerns about genetic information privacy negatively impact the likelihood of disclosure while the perceived benefits of disclosure and trust in the institution receiving the information have a positive influence. The experiment results also show that the risk of discrimination negatively affects the likelihood of disclosure, while the positive impact that disclosure has on the probability of finding a cure and the presence of a monetary incentive to disclose, increase the likelihood. We also study the determinants of individuals’ decision to be informed of findings about their health, and how information about health status is used for financial decisions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Facing the exigencies of Emancipation, a South in ruins, and ongoing violence, between 1862 and 1872 the United States Congress debated the role education would play in the postbellum polity. Positing schooling as a panacea for the nation’s problems, a determiner of individual worth, and a way of ameliorating state and federal tensions, congressional leaders envisioned education as a way of reshaping American political life. In pursuit of this vision, many policymakers advocated national school agencies and assertive interventions into state educational systems. Interrogating the meaning of “education” for congressional leaders, this study examines the role of this ambiguous concept in negotiating the contradictions of federal and state identity, projecting visions of social change, evaluating civic preparedness, and enabling broader debates over the nation’s future. Examining legislative debates over the Reconstruction Acts, Freedmen’s Bureau, Bureau of Education, and two bills for national education reform in the early 1870s, this project examines how disparate educational visions of Republicans and Democrats collided and mutated amid the vicissitudes of public policy argument. Engaging rhetorical concepts of temporality, disposition, and political judgment, it examines the allure and limitations of education policy rhetoric, and how this rhetoric shifted amid the difficult process of coming to policy agreements in a tumultuous era. In a broader historical sense, this project considers the role of Reconstruction Era congressional rhetoric in shaping the long-term development of contemporary Americans’ “educational imaginary,” the tacit, often unarticulated assumptions about schooling that inflect how contemporary Americans engage in political life, civic judgment, and social reform. Treating the analysis of public policy debate as a way to gain insights into transitions in American political life, the study considers how Reconstruction Era debate converged upon certain common agreements, and obfuscated significant fault lines, that persist in contemporary arguments.