8 resultados para Anonymity

em Aston University Research Archive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We assessed the feasibility of developing a virtual diabetes clinic for young people, using the Internet. The proposed content of the site would be based on self-efficacy theory, aiming to develop confidence in self-management of diabetes. A questionnaire about the proposed Website was delivered to 72 patients who attended a young person’s outpatient clinic in a district hospital. Thirty-nine replies were received, a response rate of 54%. The mean age of the respondents was 13 years. A positive attitude to the potential clinic was reported by 95% of respondents. The items rated as most useful were: quick and easy access to up-todate information about diabetes; the opportunity to ask an expert; good graphics; easy navigation; interactivity. Responses to open questions indicated that 24-hour access and anonymity in asking questions were also valued. A virtual clinic appears to be a possible method of health-care delivery to young people with diabetes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: This paper sets out to contribute to the advancement of knowledge, particularly with regard to the processes of implementation and the role of managers engaged in such high commitment strategies and work practices. Design/methodology/approach: This study is part of a research project investigating the extent to which employee involvement predicts job performance (as well as job satisfaction, wellbeing and organisational commitment) in the NHS, using both quantitative and qualitative methods. The main focus of this paper is to present evidence from four of the 20 case studies to show the barriers to implementing employee involvement as well as highlighting the techniques and practices that have proven to be most successful. Findings: Employee involvement is used successfully by management and has enabled frontline staff to contribute their knowledge to their work. Research limitations/implications: The ethical issues of confidentiality and anonymity permeated the research process throughout. Practical implications: The link between "high commitment" strategies and organisational performance is of great interest to academics and practitioners alike. One of these "high commitment" strategies, namely employee involvement, has been an important HR strategy for the NHS in the UK. Originality/value: Other organisations can learn from the findings by implementing the successful parts. © Emerald Group Publishing Limited.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article discusses the emergence of cyberstalking as a means of victimising individuals and minority groups. However, rather than focusing on the activities of far-right groups, we discuss how technology can encourage individuals to harass others. The central argument made is that technology both enables and invites participation in criminal or antisocial behaviour from individuals who would not normally take part in such activities. One way in which this can be explained is by suggesting that some of the social and technological characteristics of the Internet act together in order to lower inhibitions and establish new norms. For instance, the anonymity offered by the Internet enables people to participate in activities such as encouraging violence against others with little fear of retaliation. In addition, by allowing a cyberstalker to harm another person at a distance, the victim is effectively depersonalised. In this way it can be argued that some of those who sympathise with the goals of far-right organisations may be reluctant to act in the offline world but more willing to act in the online world.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article explores the settings and practices of translation at three types of political institutions, i.e. national, supranational, and non-governmental organisations. The three institutions are the translation service of the German Foreign Office, the translation department of the European Central Bank, and translation provision by the non-governmental organisation Amnesty International. The three case studies describe the specific translation practices in place at these institutions and illustrate some characteristic translation strategies. In this way, we reflect on how different translation practices can impact on translation agency and how these practices in turn are influenced by the type of institution and its organisational structure. The article also aims to explore to which extent the characteristics of collectivity, anonymity and standardisation, and of institutional translation as self-translation are applicable to the institutions under discussion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trust is a critical component of successful e-Commerce. Given the impersonality, anonymity, and automation of transactions, online vendor trustworthiness cannot be assessed by means of body language and other environmental cues that consumers typically use when deciding to trust offline retailers. It is therefore essential that the design of e-Commerce websites compensate by incorporating circumstantial cues in the form of appropriate trust triggers. This paper presents and discusses the results of a study which took an initial look at whether consumers with different personality types (a) are generally more trusting and (b) rely on different trust cues during their assessment of first impression vendor trustworthiness in B2C e-Commerce.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The popularity of online social media platforms provides an unprecedented opportunity to study real-world complex networks of interactions. However, releasing this data to researchers and the public comes at the cost of potentially exposing private and sensitive user information. It has been shown that a naive anonymization of a network by removing the identity of the nodes is not sufficient to preserve users’ privacy. In order to deal with malicious attacks, k -anonymity solutions have been proposed to partially obfuscate topological information that can be used to infer nodes’ identity. In this paper, we study the problem of ensuring k anonymity in time-varying graphs, i.e., graphs with a structure that changes over time, and multi-layer graphs, i.e., graphs with multiple types of links. More specifically, we examine the case in which the attacker has access to the degree of the nodes. The goal is to generate a new graph where, given the degree of a node in each (temporal) layer of the graph, such a node remains indistinguishable from other k-1 nodes in the graph. In order to achieve this, we find the optimal partitioning of the graph nodes such that the cost of anonymizing the degree information within each group is minimum. We show that this reduces to a special case of a Generalized Assignment Problem, and we propose a simple yet effective algorithm to solve it. Finally, we introduce an iterated linear programming approach to enforce the realizability of the anonymized degree sequences. The efficacy of the method is assessed through an extensive set of experiments on synthetic and real-world graphs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper looks at the issue of privacy and anonymity through the prism of Scott's concept of legibility i.e. the desire of the state to obtain an ever more accurate mapping of its domain and the actors in its domain. We argue that privacy was absent in village life in the past, and it has arisen as a temporary phenomenon arising from the lack of appropriate technology to make all life in the city legible. Cities have been the loci of creativity for the major part of human civilisation. There is something specific about the illegibility of cities which facilitates creativity and innovation. By providing the technology to catalogue and classify all objects and ideas around us, this leads to a consideration of semantic web technologies, Linked Data and the Internet of Things as unwittingly furthering this ever greater legibility. There is a danger that the over description of a domain will lead to a loss in creativity and innovation. We conclude by arguing that our prime concern must be to preserve illegibility because the survival of some form, any form, of civilisation depends upon it.