16 resultados para privacy violations
em University of Queensland eSpace - Australia
Resumo:
Many organizations now emphasize the use of technology that can help them get closer to consumers and build ongoing relationships with them. The ability to compile consumer data profiles has been made even easier with Internet technology. However, it is often assumed that consumers like to believe they can trust a company with their personal details. Lack of trust may cause consumers to have privacy concerns. Addressing such privacy concerns may therefore be crucial to creating stable and ultimately profitable customer relationships. Three specific privacy concerns that have been frequently identified as being of importance to consumers include unauthorized secondary use of data, invasion of privacy, and errors. Results of a survey study indicate that both errors and invasion of privacy have a significant inverse relationship with online purchase behavior. Unauthorized use of secondary data appears to have little impact. Managerial implications include the careful selection of communication channels for maximum impact, the maintenance of discrete “permission-based” contact with consumers, and accurate recording and handling of data.
Resumo:
Following on from previous work [J.-A. Larsson, Phys. Rev. A 67, 022108 (2003)], Bell inequalities based on correlations between binary digits are considered for a particular entangled state involving 2N trapped ions. These inequalities involve applying displacement operations to half of the ions and then measuring correlations between pairs of corresponding bits in the binary representations of the number of center-of-mass phonons of N particular ions. It is shown that the state violates the inequalities and thus displays nonclassical correlations. It is also demonstrated that it violates a Bell inequality when the displacements are replaced by squeezing operations.
Resumo:
We develop a model for exponential decay of broadband pulses, and examine its implications for experiments on optical precursors. One of the signature features of Brillouin precursors is attenuation with a less rapid decay than that predicted by Beer's Law. Depending on the pulse parameters and the model that is adopted for the dielectric properties of the medium, the limiting z-dependence of the loss has been described as z(-1/2), z(-1/3), exponential, or, in more detailed descriptions, some combination of the above. Experimental results in the search for precursors are examined in light of the different models, and a stringent test for sub-exponential decay is applied to data on propagation of 500 femtosecond pulses through 1-5 meters of water. (C) 2005 Optical Society of America.
Resumo:
Objective. To evaluate the efficacy of a short-term tobacco-focused intervention for high school students referred by school administrators because of tobacco use. Method. A sample of 56 adolescents (66% male, mean age 15 years) was recruited through referrals from three state high schools. Participants were randomly assigned to a one-hour motivational interview (MI) session or to standard care (advice/education). The two groups were followed up at one, three, and six-month intervals. Results. The MI intervention resulted in significant short-term reductions in quantity and frequency of smoking relative to standard care, however, effects were not maintained at 3- and 6-month follow-up. Improvements in refusal self-efficacy were significant relative to standard care. Conclusion. For adolescents who are established smokers and at high risk of other problems, motivational interviewing was associated with modest short-term gains relative to standard care. (c) 2006 Elsevier Inc. All rights reserved.
Resumo:
In this paper we present a Gentzen system for reasoning with contrary-to-duty obligations. The intuition behind the system is that a contrary-to-duty is a special kind of normative exception. The logical machinery to formalise this idea is taken from substructural logics and it is based on the definition of a new non-classical connective capturing the notion of reparational obligation. Then the system is tested against well-known contrary-to-duty paradoxes.
Resumo:
A major inhibitor to e-commerce stems from the reluctance consumers have to complete transactions because of concern over the use of private information divulged in online transaction processing. Because e-commerce occurs in a global environment, cultural factors are likely to have a significant impact on this concern. Building on work done in the area of culture and privacy, and also trust and privacy, we explore the three way relationship between culture, privacy and trust. Better, more appropriate, and contemporary measures of culture have recently been espoused, and a better understanding and articulation of internet users information privacy concern has been developed. We present the results of an exploratory study that builds on the work of Milberg, Gefen, and Bellman to better understand and test the effect that national culture has on trust and internet privacy.
Resumo:
Context information is used by pervasive networking and context-aware programs to adapt intelligently to different environments and user tasks. As the context information is potentially sensitive, it is often necessary to provide privacy protection mechanisms for users. These mechanisms are intended to prevent breaches of user privacy through unauthorised context disclosure. To be effective, such mechanisms should not only support user specified context disclosure rules, but also the disclosure of context at different granularities. In this paper we describe a new obfuscation mechanism that can adjust the granularity of different types of context information to meet disclosure requirements stated by the owner of the context information. These requirements are specified using a preference model we developed previously and have since extended to provide granularity control. The obfuscation process is supported by our novel use of ontological descriptions that capture the granularity relationship between instances of an object type.