209 resultados para Anonymity


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Inequalities in oral healthcare service provision to people with special health needs have been reported in the Republic of Ireland. These include higher unmet dental treatment needs and longer waiting period to access routine dental treatment than the general population. Aim: The aims of this study were to determine the groups of patients with special needs which pose a challenge to manage in the dental surgery and to examine perceived barriers to the care of these patients. We aimed to determine whether postgraduate training in the management of these patients increases the practitioners’ frequency of treatment and their desire for further training in this area. Methods: A questionnaire was used to survey 326 randomly selected dentists from the Dental Council’s register of dentists. Questionnaire and information sheets explaining the purpose of the survey, confidentiality and anonymity of the responses were posted to the dentists. Results: The results showed that children with intellectual disability posed the biggest challenge for dentists to manage in the dental surgery. Behaviour management issues and the degree of disability were perceived by many dentists as factors that would have high effects on their willingness to treat patients with special needs. Dentists who have postgraduate training in the management of patients with special needs were significantly more willing to treat these patients and to seek additional training in the future. Conclusion: There are links between the training and the willingness of practitioners to undertake dental treatment or patients with special healthcare needs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El breve commentum in Statii Achilleida resulta muy interesante para el estudio de la transmisión mitográfica de la Antigüedad tardía al Medievo, pues no sólo participa de las características propias de la mitografía (narraciones de mitos, exégesis racionalista y/o alegórica, interpretaciones etimológicas, anonimato, pseudepigrafía,…), sino que también es otro eslabón en la cadena textual de transmisión, simplificación y canonización de los mitos clásicos.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

I wanted to explore whether traditional Forum Theatre approaches can be enhanced by the use of integrated voting software to empower young people. My research is based on two of a series of widening participation interactive TiE programmes focused on the decisions young people make on educational progression. I worked as a director alongside students studying Drama and Performance at The University of Worcester and the programmes have toured widely to schools across Worcestershire and Herefordshire. ‘It’s Up to You!’ (2013 – 2014) was aimed at years 8 and 9 choosing their GCSE options and ‘Move on Up!’ (2014 - 2015) looked at the hopes and fears of year 6 pupils about to go up to secondary school. Finding a voice in Boal’s framework as a ‘specactor’ does not always appeal to a pupil who does not want to stand out from the crowd or is not familiar with a classroom where drama conventions are practised or understood. The anonymity of the voting software with results of decisions made appearing instantly on screen is certainly appealing to some pupils: ‘I also loved the keypads they gave us so that we could answer the questions without having to put our hand up and wait..’ This paper aims to interrogate the idea that empowering needs to not simply be about giving voice to a few confident group members but allowing the silent majority to be able to experiment with decision making in an educational and social context.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Internet users consume online targeted advertising based on information collected about them and voluntarily share personal information in social networks. Sensor information and data from smart-phones is collected and used by applications, sometimes in unclear ways. As it happens today with smartphones, in the near future sensors will be shipped in all types of connected devices, enabling ubiquitous information gathering from the physical environment, enabling the vision of Ambient Intelligence. The value of gathered data, if not obvious, can be harnessed through data mining techniques and put to use by enabling personalized and tailored services as well as business intelligence practices, fueling the digital economy. However, the ever-expanding information gathering and use undermines the privacy conceptions of the past. Natural social practices of managing privacy in daily relations are overridden by socially-awkward communication tools, service providers struggle with security issues resulting in harmful data leaks, governments use mass surveillance techniques, the incentives of the digital economy threaten consumer privacy, and the advancement of consumergrade data-gathering technology enables new inter-personal abuses. A wide range of fields attempts to address technology-related privacy problems, however they vary immensely in terms of assumptions, scope and approach. Privacy of future use cases is typically handled vertically, instead of building upon previous work that can be re-contextualized, while current privacy problems are typically addressed per type in a more focused way. Because significant effort was required to make sense of the relations and structure of privacy-related work, this thesis attempts to transmit a structured view of it. It is multi-disciplinary - from cryptography to economics, including distributed systems and information theory - and addresses privacy issues of different natures. As existing work is framed and discussed, the contributions to the state-of-theart done in the scope of this thesis are presented. The contributions add to five distinct areas: 1) identity in distributed systems; 2) future context-aware services; 3) event-based context management; 4) low-latency information flow control; 5) high-dimensional dataset anonymity. Finally, having laid out such landscape of the privacy-preserving work, the current and future privacy challenges are discussed, considering not only technical but also socio-economic perspectives.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose The purpose of this paper was to review the effectiveness of telephone interviewing for capturing data and to consider in particular the challenges faced by telephone interviewers when capturing information about market segments. Design/methodology/approach The platform for this methodological critique was a market segment analysis commissioned by Sport Wales which involved a series of 85 telephone interviews completed during 2010. Two focus groups involving the six interviewers involved in the study were convened to reflect on the researchers’ experiences and the implications for business and management research. Findings There are three principal sets of findings. First, although telephone interviewing is generally a cost-effective data collection method, it is important to consider both the actual costs (i.e. time spent planning and conducting interviews) as well as the opportunity costs (i.e. missed appointments, “chasing participants”). Second, researchers need to be sensitised to and sensitive to the demographic characteristics of telephone interviewees (insofar as these are knowable) because responses are influenced by them. Third, the anonymity of telephone interviews may be more conducive for discussing sensitive issues than face-to-face interactions. Originality/value The present study adds to this modest body of literature on the implementation of telephone interviewing as a research technique of business and management. It provides valuable methodological background detail about the intricate, personal experiences of researchers undertaking this method “at a distance” and without visual cues, and makes explicit the challenges of telephone interviewing for the purposes of data capture.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being encrypted. The prevalence of encrypted protocols as the underpinning of such critical services as e-commerce, remote login, and anonymity networks and the increasing feasibility of attacks on these services represent a considerable risk to communications security. Existing mechanisms for preventing traffic analysis focus on re-routing and padding. These prevention techniques have considerable resource and overhead requirements. Furthermore, padding is easily detectable and, in some cases, can introduce its own vulnerabilities. To address these shortcomings, we propose embedding real traffic in synthetically generated encrypted cover traffic. Novel to our approach is our use of realistic network protocol behavior models to generate cover traffic. The observable traffic we generate also has the benefit of being indistinguishable from other real encrypted traffic further thwarting an adversary's ability to target attacks. In this dissertation, we introduce the design of a proxy system called TrafficMimic that implements realistic cover traffic tunneling and can be used alone or integrated with the Tor anonymity system. We describe the cover traffic generation process including the subtleties of implementing a secure traffic generator. We show that TrafficMimic cover traffic can fool a complex protocol classification attack with 91% of the accuracy of real traffic. TrafficMimic cover traffic is also not detected by a binary classification attack specifically designed to detect TrafficMimic. We evaluate the performance of tunneling with independent cover traffic models and find that they are comparable, and, in some cases, more efficient than generic constant-rate defenses. We then use simulation and analytic modeling to understand the performance of cover traffic tunneling more deeply. We find that we can take measurements from real or simulated traffic with no tunneling and use them to estimate parameters for an accurate analytic model of the performance impact of cover traffic tunneling. Once validated, we use this model to better understand how delay, bandwidth, tunnel slowdown, and stability affect cover traffic tunneling. Finally, we take the insights from our simulation study and develop several biasing techniques that we can use to match the cover traffic to the real traffic while simultaneously bounding external information leakage. We study these bias methods using simulation and evaluate their security using a Bayesian inference attack. We find that we can safely improve performance with biasing while preventing both traffic analysis and defense detection attacks. We then apply these biasing methods to the real TrafficMimic implementation and evaluate it on the Internet. We find that biasing can provide 3-5x improvement in bandwidth for bulk transfers and 2.5-9.5x speedup for Web browsing over tunneling without biasing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wydział Matematyki i Informatyki UAM

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present article is about a particular form of sexual activity on the Internet: cybersex in chatrooms-in Portuguese by Portuguese people. This study aims to identify the reasons for engaging in cybersex on chats and the behavioral domains that characterize this activity. To carry out the study, we developed a self-report questionnaire that we made available on a website. The sample was collected online (n = 400) through the Portuguese Internet Relay Chat. Factor analyses revealed seven domain structures: (a) social skills, (b) preference for cybersex, (c) filter for a later date, (d) sex by phone, (e) fantasies, (f) using masks, and (g) impact on real relationships. We found a huge variety of sexual attitudes and behaviors connected to cybersex in chatrooms and the existence of two major trends: (a) people that use these chats as a starting place for offline relationships (online anonymity prevents the fear of rejection and social sanctions in real life), and (b) people who want and prefer online sex without any interest in further real contacts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in many applications. Although much work has been done to provide privacy and anonymity, little focus has been given to ensure RFID data confidentiality, integrity and to address the tampered data recovery problem. To this end, we propose a lightweight stenographic-based approach to ensure RFID data confidentiality and integrity as well as the recovery of tampered RFID data. © 2013 Springer-Verlag Berlin Heidelberg.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Judicial decisions about whether or not to publicly name child homicide offenders have long ani- mated debate in the United Kingdom and internationally. This article draws on case law and in- depth interviews conducted with members of the English criminal justice system to critically analyse the viability of current domestic legislation in the context of the UK’s international human rights obligations. The article identifies ambiguities surrounding the definition of ‘public interest’ in law; the merits of equating the naming of child offenders with open justice, accountability and transpar- ency; and the increasing sabotage of the principle of rehabilitation. By identifying the complexities of this contentious area of judicial discretion, this article highlights the need for a rights-based approach to decisions about publicly naming children in conflict with the law.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cryptocurrencies such as Bitcoin are a recent socio-technical innovation that seeks to disrupt the existing monetary system. Through mundane uses of this new digital cash, they provide a social critique of the centralised infrastructures of the banking industry. This paper outlines an ethnographic research agenda that considers how the social uptake and use of cryptocurrencies such as Bitcoin represents alternative views towards value exchange and critiques existing financial structures. We begin by arguing that the use of Bitcoin can be seen as an act of social resistance that is intended to bridge socio-economic inequalities within the context of a digital community. We then outline the disruptive nature of borderless, affordable and instantaneous international transfers in the form of remittances within social practice. Finally, we identify the possible permutations of trust that may be found in the technical affordances of Bitcoin technology and how these relate to user (pseudo)anonymity, cybertheft, cyberfraud, and consumer protection. Bringing together these three key areas, we highlight the importance of understanding the ordinary (rather than extra-ordinary) uses of cryptocurrencies such as Bitcoin. We contend that focusing upon users’ interactions with Bitcoin as a payments system and community culture will shed light upon mundane acts of socio-technical disruption, acts that critique and provide alternative financial exchange practices to the payments and regulatory financial infrastructures of the banking industry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The introduction of online social networks (OSN) has transformed the way people connect and interact with each other as well as share information. OSN have led to a tremendous explosion of network-centric data that could be harvested for better understanding of interesting phenomena such as sociological and behavioural aspects of individuals or groups. As a result, online social network service operators are compelled to publish the social network data for use by third party consumers such as researchers and advertisers. As social network data publication is vulnerable to a wide variety of reidentification and disclosure attacks, developing privacy preserving mechanisms are an active research area. This paper presents a comprehensive survey of the recent developments in social networks data publishing privacy risks, attacks, and privacy-preserving techniques. We survey and present various types of privacy attacks and information exploited by adversaries to perpetrate privacy attacks on anonymized social network data. We present an in-depth survey of the state-of-the-art privacy preserving techniques for social network data publishing, metrics for quantifying the anonymity level provided, and information loss as well as challenges and new research directions. The survey helps readers understand the threats, various privacy preserving mechanisms, and their vulnerabilities to privacy breach attacks in social network data publishing as well as observe common themes and future directions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The study explored how two experienced early childhood teachers support children dealing with crisis in their home environment, namely divorce, domestic violence and imprisonment of parents. The focus was on the relationship between the educational environment (organisation of space, time and relationships in an ecological perspective) and children's emotional well-being. This study builds on studies in Portugal about emotional well-being (Portugal & Laevers, 2010) and about the impact on children from imprisoned parents (Afonso, 2005, Kominsky, Pinto & Miyashiro, 2005, Tavares, 2011), domestic violence (Batista, 2014, Lisboa et al., 2002, Ribeiro, 2010) and divorce (Martons, 2010, Rego, 2008). The theoretical framework was weaved with Laevers (2004) concepts of emotional well-being and involvement and Siraj-Blatchford (2002) and Figueiredo (2013) perspective of pedagogy as including different dimensions of which the educational environment is essential. In-depth interviews with both teachers and some observations of their classroom dynamics were analysed for emerging cross themes in this qualitative study. Anonymity was preserved throughout the study by the use of codes. The study was presented to the teachers and questions were presented in advance. Both teachers expressed preference for adapting existing pedagogical tools (e.g. the classroom diary) and the daily dynamic to support children instead of using special interventions. Domestic violence was seen as the most problematic situation for its repercussions. Attention to emotional well-being, a strong relationship with the child and the families was highlighted. Pedagogy was described as answering different challenges, with a strong emphasis on children's participation. Thematising teachers' pedagogical knowledge is important.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este trabajo se inscribe en uno de los grandes campos de los estudios organizacionales: la estrategia. La perspectiva clásica en este campo promovió la idea de que proyectarse hacia el futuro implica diseñar un plan (una serie de acciones deliberadas). Avances posteriores mostraron que la estrategia podía ser comprendida de otras formas. Sin embargo, la evolución del campo privilegió en alguna medida la mirada clásica estableciendo, por ejemplo, múltiples modelos para ‘formular’ una estrategia, pero dejando en segundo lugar la manera en la que esta puede ‘emerger’. El propósito de esta investigación es, entonces, aportar al actual nivel de comprensión respecto a las estrategias emergentes en las organizaciones. Para hacerlo, se consideró un concepto opuesto —aunque complementario— al de ‘planeación’ y, de hecho, muy cercano en su naturaleza a ese tipo de estrategias: la improvisación. Dado que este se ha nutrido de valiosos aportes del mundo de la música, se acudió al saber propio de este dominio, recurriendo al uso de ‘la metáfora’ como recurso teórico para entenderlo y alcanzar el objetivo propuesto. Los resultados muestran que 1) las estrategias deliberadas y las emergentes coexisten y se complementan, 2) la improvisación está siempre presente en el contexto organizacional, 3) existe una mayor intensidad de la improvisación en el ‘como’ de la estrategia que en el ‘qué’ y, en oposición a la idea convencional al respecto, 4) se requiere cierta preparación para poder improvisar de manera adecuada.