63 resultados para Information privacy Framework


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Biometric systems provide a valuable service in helping to identify individuals from their stored personal details. Unfortunately, with the rapidly increasing use of such systems, there is a growing concern about the possible misuse of that information. To counteract the threat, the European Union (EU) has introduced comprehensive legislation that seeks to regulate data collection and help strengthen an individual’s right to privacy. This article looks at the implications of the legislation for biometric system deployment. After an initial consideration of current privacy concerns, it examines what is meant by ‘personal data’ and its protection, in legislation terms. Also covered are issues around the storage of biometric data, including its accuracy, its security, and justification for what is collected. Finally, the privacy issues are illustrated through three biometric use cases: border security, online bank access control and customer profiling in stores.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Modern cancer research on prognostic and predictive biomarkers demands the integration of established and emerging high-throughput technologies. However, these data are meaningless unless carefully integrated with patient clinical outcome and epidemiological information. Integrated datasets hold the key to discovering new biomarkers and therapeutic targets in cancer. We have developed a novel approach and set of methods for integrating and interrogating phenomic, genomic and clinical data sets to facilitate cancer biomarker discovery and patient stratification. Applied to a known paradigm, the biological and clinical relevance of TP53, PICan was able to recapitulate the known biomarker status and prognostic significance at a DNA, RNA and protein levels.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: Serious case reviews and research studies have indicated weaknesses in risk assessments conducted by child protection social workers. Social workers are adept at gathering information but struggle with analysis and assessment of risk. The Department for Education wants to know if the use of a structured decision-making tool can improve child protection assessments of risk.

Methods/design: This multi-site, cluster-randomised trial will assess the effectiveness of the Safeguarding Children Assessment and Analysis Framework (SAAF). This structured decision-making tool aims to improve social workers' assessments of harm, of future risk and parents' capacity to change. The comparison is management as usual.

Inclusion criteria: Children's Services Departments (CSDs) in England willing to make relevant teams available to be randomised, and willing to meet the trial's training and data collection requirements.

Exclusion criteria: CSDs where there were concerns about performance; where a major organisational restructuring was planned or under way; or where other risk assessment tools were in use.

Six CSDs are participating in this study. Social workers in the experimental arm will receive 2 days training in SAAF together with a range of support materials, and access to limited telephone consultation post-training. The primary outcome is child maltreatment. This will be assessed using data collected nationally on two key performance indicators: the first is the number of children in a year who have been subject to a second Child Protection Plan (CPP); the second is the number of re-referrals of children because of related concerns about maltreatment. Secondary outcomes are: i) the quality of assessments judged against a schedule of quality criteria and ii) the relationship between the three assessments required by the structured decision-making tool (level of harm, risk of (re) abuse and prospects for successful intervention).

Discussion: This is the first study to examine the effectiveness of SAAF. It will contribute to a very limited literature on the contribution that structured decision-making tools can make to improving risk assessment and case planning in child protection and on what is involved in their effective implementation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In many CCTV and sensor network based intelligent surveillance systems, a number of attributes or criteria are used to individually evaluate the degree of potential threat of a suspect. The outcomes for these attributes are in general from analytical algorithms where data are often pervaded with uncertainty and incompleteness. As a result, such individual threat evaluations are often inconsistent, and individual evaluations can change as time elapses. Therefore, integrating heterogeneous threat evaluations with temporal influence to obtain a better overall evaluation is a challenging issue. So far, this issue has rarely be considered by existing event reasoning frameworks under uncertainty in sensor network based surveillance. In this paper, we first propose a weighted aggregation operator based on a set of principles that constraints the fusion of individual threat evaluations. Then, we propose a method to integrate the temporal influence on threat evaluation changes. Finally, we demonstrate the usefulness of our system with a decision support event modeling framework using an airport security surveillance scenario.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent difficult economic times, the efficiency with which a charity spends the funds entrusted to it has become an increasingly important aspect of charitable performance. Transparency on efficiency, including the reporting of relevant measures and information to understand, contextualise and evaluate such measures, is suggested as important to a range of stakeholders. However, using a novel framework for the analysis of efficiency reporting in the context of transparency and stakeholder theory, this research provides evidence that reporting on efficiency in UK (United Kingdom) charities lacks transparency, both in terms of the extent and manner of disclosure. It is argued that efficiency reporting in UK charities is more concerned with legitimising these organisations rather than providing ethically-driven accounts of their efficiency.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background
Low patient adherence to treatment is associated with poorer health outcomes in bronchiectasis. We sought to use the Theoretical Domains Framework (TDF) (a framework derived from 33 psychological theories) and behavioural change techniques (BCTs) to define the content of an intervention to change patients’ adherence in bronchiectasis (Stage 1 and 2) and stakeholder expert panels to define its delivery (Stage 3).

Methods
We conducted semi-structured interviews with patients with bronchiectasis about barriers and motivators to adherence to treatment and focus groups or interviews with bronchiectasis healthcare professionals (HCPs) about their ability to change patients’ adherence to treatment. We coded these data to the 12 domain TDF to identify relevant domains for patients and HCPs (Stage 1). Three researchers independently mapped relevant domains for patients and HCPs to a list of 35 BCTs to identify two lists (patient and HCP) of potential BCTs for inclusion (Stage 2). We presented these lists to three expert panels (two with patients and one with HCPs/academics from across the UK). We asked panels who the intervention should target, who should deliver it, at what intensity, in what format and setting, and using which outcome measures (Stage 3).

Results
Eight TDF domains were perceived to influence patients’ and HCPs’ behaviours: Knowledge, Skills, Beliefs about capability, Beliefs about consequences, Motivation, Social influences, Behavioural regulation and Nature of behaviours (Stage 1). Twelve BCTs common to patients and HCPs were included in the intervention: Monitoring, Self-monitoring, Feedback, Action planning, Problem solving, Persuasive communication, Goal/target specified:behaviour/outcome, Information regarding behaviour/outcome, Role play, Social support and Cognitive restructuring (Stage 2). Participants thought that an individualised combination of these BCTs should be delivered to all patients, by a member of staff, over several one-to-one and/or group visits in secondary care. Efficacy should be measured using pulmonary exacerbations, hospital admissions and quality of life (Stage 3).

Conclusions
Twelve BCTs form the intervention content. An individualised selection from these 12 BCTs will be delivered to all patients over several face-to-face visits in secondary care. Future research should focus on developing physical materials to aid delivery of the intervention prior to feasibility and pilot testing. If effective, this intervention may improve adherence and health outcomes for those with bronchiectasis in the future.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

People usually perform economic interactions within the social setting of a small group, while they obtain relevant information from a broader source. We capture this feature with a dynamic interaction model based on two separate social networks. Individuals play a coordination game in an interaction network, while updating their strategies using information from a separate influence network through which information is disseminated. In each time period, the interaction and influence networks co-evolve, and the individuals’ strategies are updated through a modified naive learning process. We show that both network structures and players’ strategies always reach a steady state, in which players form fully connected groups and converge to local conventions. We also analyze the influence exerted by a minority group of strongly opinionated players on these outcomes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Changes in the economic climate and the delivery of health care require that pre-operative information programmes are effective and efficiently implemented. In order to be effective the pre-operative programme must meet the information needs of intensive care unit (ICU) patients and their relatives. Efficiency can be achieved through a structured pre-operative programme which provides a framework for teaching. The need to develop an ICU information booklet in a large teaching hospital in Northern Ireland has become essential to provide relevant information and improve the quality of service for patients and relatives, as set out in the White Paper, ‘Working for Patients’, (DoH, 1989). The first step in establishing a patient education programme was to ascertain patients' and relatives' informational needs. A ‘needs assessment’ identified the pre-operative information needs of ICU patients and their relatives (McGaughey, 1994) and the findings were used to plan and publish an information booklet. The ICU booklet provides a structure for pre-operative visits to ensure that patients and relatives information needs are met.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Understanding animal contests has benefited greatly from employing the concept of fighting ability, termed resource-holding potential (RHP), with body size/weight typically used as a proxy. However, victory does not always go to the larger/heavier contestant and the existing RHP approach thereby fails to accurately predict contest outcome. Aggressiveness, typically studied as a personality trait, might explain part of this discrepancy. We investigated whether aggressiveness forms a component of RHP, examining effects on contest outcome, duration and phases, plus physiological measures of costs (lactate and glucose). Furthermore, using the correct theoretical framework, we provide the first study to investigate whether individuals gather and use information on aggressiveness as part of an assessment strategy. Pigs, Sus scrofa, were assessed for aggressiveness in resident-intruder tests whereby attack latency reflects aggressiveness. Contests were then staged between size-matched animals diverging in aggressiveness. Individuals with a short attack latency in the resident-intruder test almost always initiated the first bite and fight in the subsequent contest. However, aggressiveness had no direct effect on contest outcome, whereas bite initiation did lead to winning in contests without an escalated fight. This indirect effect suggests that aggressiveness is not a component of RHP, but rather reflects a signal of intent. Winner and loser aggressiveness did not affect contest duration or its separate phases, suggesting aggressiveness is not part of an assessment strategy. A greater asymmetry in aggressiveness prolonged contest duration and the duration of displaying, which is in a direction contrary to assessment models based on morphological traits. Blood lactate and glucose increased with contest duration and peaked during escalated fights, highlighting the utility of physiological measures as proxies for fight cost. Integrating personality traits into the study of contest behaviour, as illustrated here, will enhance our understanding of the subtleties of agonistic interactions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This report summarizes our results from security analysis covering all 57 competitions for authenticated encryption: security, applicability, and robustness (CAESAR) first-round candidates and over 210 implementations. We have manually identified security issues with three candidates, two of which are more serious, and these ciphers have been withdrawn from the competition. We have developed a testing framework, BRUTUS, to facilitate automatic detection of simple security lapses and susceptible statistical structures across all ciphers. From this testing, we have security usage notes on four submissions and statistical notes on a further four. We highlight that some of the CAESAR algorithms pose an elevated risk if employed in real-life protocols due to a class of adaptive-chosen-plaintext attacks. Although authenticated encryption with associated data are often defined (and are best used) as discrete primitives that authenticate and transmit only complete messages, in practice, these algorithms are easily implemented in a fashion that outputs observable ciphertext data when the algorithm has not received all of the (attacker-controlled) plaintext. For an implementor, this strategy appears to offer seemingly harmless and compliant storage and latency advantages. If the algorithm uses the same state for secret keying information, encryption, and integrity protection, and the internal mixing permutation is not cryptographically strong, an attacker can exploit the ciphertext–plaintext feedback loop to reveal secret state information or even keying material. We conclude that the main advantages of exhaustive, automated cryptanalysis are that it acts as a very necessary sanity check for implementations and gives the cryptanalyst insights that can be used to focus more specific attack methods on given candidates.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Predicting the next location of a user based on their previous visiting pattern is one of the primary tasks over data from location based social networks (LBSNs) such as Foursquare. Many different aspects of these so-called “check-in” profiles of a user have been made use of in this task, including spatial and temporal information of check-ins as well as the social network information of the user. Building more sophisticated prediction models by enriching these check-in data by combining them with information from other sources is challenging due to the limited data that these LBSNs expose due to privacy concerns. In this paper, we propose a framework to use the location data from LBSNs, combine it with the data from maps for associating a set of venue categories with these locations. For example, if the user is found to be checking in at a mall that has cafes, cinemas and restaurants according to the map, all these information is associated. This category information is then leveraged to predict the next checkin location by the user. Our experiments with publicly available check-in dataset show that this approach improves on the state-of-the-art methods for location prediction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There has been much interest in the belief–desire–intention (BDI) agent-based model for developing scalable intelligent systems, e.g. using the AgentSpeak framework. However, reasoning from sensor information in these large-scale systems remains a significant challenge. For example, agents may be faced with information from heterogeneous sources which is uncertain and incomplete, while the sources themselves may be unreliable or conflicting. In order to derive meaningful conclusions, it is important that such information be correctly modelled and combined. In this paper, we choose to model uncertain sensor information in Dempster–Shafer (DS) theory. Unfortunately, as in other uncertainty theories, simple combination strategies in DS theory are often too restrictive (losing valuable information) or too permissive (resulting in ignorance). For this reason, we investigate how a context-dependent strategy originally defined for possibility theory can be adapted to DS theory. In particular, we use the notion of largely partially maximal consistent subsets (LPMCSes) to characterise the context for when to use Dempster’s original rule of combination and for when to resort to an alternative. To guide this process, we identify existing measures of similarity and conflict for finding LPMCSes along with quality of information heuristics to ensure that LPMCSes are formed around high-quality information. We then propose an intelligent sensor model for integrating this information into the AgentSpeak framework which is responsible for applying evidence propagation to construct compatible information, for performing context-dependent combination and for deriving beliefs for revising an agent’s belief base. Finally, we present a power grid scenario inspired by a real-world case study to demonstrate our work.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mobile App technology in social work education remains in the embryonic stages of development with a few notable exceptions. The use of Apps in College and University settings has been reported in other sectors of higher education, although there is a paucity of research in relation to its relevance to social work education and practice. The following article describes the creation of four social work education and practice Apps by a team of social work educators. The primary focus is on the design process and the partnership approach to the creation of the tools. It also outlines the rationale for the App development, the working process and the theoretical framework underpinning mobile learning. Furthermore, it provides information on the level of usage of the Apps according to geographical location, download information and time spent on each section of the App. The article also incorporates a pragmatic summary of developmental guidelines which may aid social work educators in the development and implementation of specialist information-based Apps for education and practice.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The transposition of the 2002/14/EC Directive, establishing a general framework for information and consultation (I&C), has proven contentious in largely voluntarist systems of employment regulation. Receiving particular criticism is the employee ‘opt-in’ mechanism as a means to access I&C rights. For non-union employees in particular, the ability and potential to negotiate rights for I&C is widely seen to be problematic. This article uniquely examines the opt-in mechanism in the context of non-unionism, considering how non-union employers respond to non-union employees invoking their legislative rights to I&C. Drawing upon a case study conducted over four years in a large non-union multinational, the evidence shows how the opt-in and negotiation process function to the advantage of the employer rather than the intended regulatory impact to advance employee rights