967 resultados para privacy protection
Resumo:
Information security and privacy in the healthcare domain is a complex and challenging problem for computer scientists, social scientists, law experts and policy makers. Appropriate healthcare provision requires specialized knowledge, is information intensive and much patient information is of a particularly sensitive nature. Electronic health record systems provide opportunities for information sharing which may enhance healthcare services, for both individuals and populations. However, appropriate information management measures are essential for privacy preservation...
Resumo:
Since the inception of the UN Convention on Biological Diversity (CBD) in 1992, little progress has been achieved in terms of involving the business community in protecting biological diversity worldwide. This article assesses the current activities of US Fortune 500 companies with respect to global biodiversity protection and the goals of the CBD. Data and information collected from 500 companies within eight major industrial sectors were further categorized at the company level to assess each company's involvement in global biodiversity protection. Our findings show that although companies' business profiles highly influence their decision-making process regarding the adoption of biodiversity protection policies and measures, their revenue profiles are less influential. We show that despite generating low revenues, companies in the utility sector are more active in the adoption of biodiversity protection policy than those in the financial sector, which generate high revenues. This study also demonstrates that companies must be convinced of the major effects of biodiversity loss on their bottom lines to be motivated to protect biological diversity. Companies' business and business-related risk profiles can also influence the adoption of biodiversity protection policies within the company. The study further demonstrates that a measurable biodiversity impact indicator is necessary for the companies to get seriously involved in the mitigation action. Finally, this study proposes a three-step biodiversity loss mitigation action framework that is drawn upon the assessment of the 500 companies that can contribute to develop an elaborative framework of business sector-specific mitigation plan. © 2013 Copyright Taylor and Francis Group, LLC.
Resumo:
This article assesses the extent to which the recently formulated Chinese concept of “Responsible Protection” (RP) offers a valuable contribution to the normative debate over R2P’s third pillar following the controversy over military intervention in Libya. While RP draws heavily on previous proposals such as the original 2001 ICISS report and Brazil’s “Responsibility while Protecting” (RwP), by amalgamating and re-packaging these earlier ideas in a more restrictive form the initiative represents a new and distinctive interpretation of R2P. However, some aspects of RP are framed too narrowly to provide workable guidelines for determining the permissibility of military intervention for civilian protection purposes, and should therefore be clarified and refined. Nevertheless, the Chinese proposal remains significant because it offers important insights into Beijing’s current stance on R2P. More broadly, China’s RP and Brazil’s RwP initiatives illustrate the growing willingness of rising, non-Western powers to assert their own normative preferences on sovereignty, intervention and global governance.
Resumo:
It is often said that Australia is a world leader in rates of copyright infringement for entertainment goods. In 2012, the hit television show, Game of Thrones, was the most downloaded television show over bitorrent, and estimates suggest that Australians accounted for a plurality of nearly 10% of the 3-4 million downloads each week. The season finale of 2013 was downloaded over a million times within 24 hours of its release, and again Australians were the largest block of illicit downloaders over BitTorrent, despite our relatively small population. This trend has led the former US Ambassador to Australia to implore Australians to stop 'stealing' digital content, and rightsholders to push for increasing sanctions on copyright infringers. The Australian Government is looking to respond by requiring Internet Service Providers to issue warnings and potentially punish consumers who are alleged by industry groups to have infringed copyright. This is the logical next step in deterring infringement, given that the operators of infringing networks (like The Pirate Bay, for example) are out of regulatory reach. This steady ratcheting up of the strength of copyright, however, comes at a significant cost to user privacy and autonomy, and while the decentralisation of enforcement reduces costs, it also reduces the due process safeguards provided by the judicial process. This article presents qualitative evidence that substantiates a common intuition: one of the major reasons that Australians seek out illicit downloads of content like Game of Thrones in such numbers is that it is more difficult to access legitimately in Australia. The geographically segmented way in which copyright is exploited at an international level has given rise to a ‘tyranny of digital distance’, where Australians have less access to copyright goods than consumers in other countries. Compared to consumers in the US and the EU, Australians pay more for digital goods, have less choice in distribution channels, are exposed to substantial delays in access, and are sometimes denied access completely. In this article we focus our analysis on premium film and television offerings, like Game of Thrones, and through semi-structured interviews, explore how choices in distribution impact on the willingness of Australian consumers to seek out infringing copies of copyright material. Game of Thrones provides an excellent case study through which to frame this analysis: it is both one of the least legally accessible television offerings and one of the most downloaded through filesharing networks of recent times. Our analysis shows that at the same time as rightsholder groups, particularly in the film and television industries, are lobbying for stronger laws to counter illicit distribution, the business practices of their member organisations are counter-productively increasing incentives for consumers to infringe. The lack of accessibility and high prices of copyright goods in Australia leads to substantial economic waste. The unmet consumer demand means that Australian consumers are harmed by lower access to information and entertainment goods than consumers in other jurisdictions. The higher rates of infringement that fulfils some of this unmet demand increases enforcement costs for copyright owners and imposes burdens either on our judicial system or on private entities – like ISPs – who may be tasked with enforcing the rights of third parties. Most worryingly, the lack of convenient and cheap legitimate digital distribution channels risks undermining public support for copyright law. Our research shows that consumers blame rightsholders for failing to meet market demand, and this encourages a social norm that infringing copyright, while illegal, is not morally wrongful. The implications are as simple as they are profound: Australia should not take steps to increase the strength of copyright law at this time. The interests of the public and those of rightsholders align better when there is effective competition in distribution channels and consumers can legitimately get access to content. While foreign rightsholders are seeking enhanced protection for their interests, increasing enforcement is likely to increase their ability to engage in lucrative geographical price-discrimination, particularly for premium content. This is only likely to increase the degree to which Australian consumers feel that their interests are not being met and, consequently, to further undermine the legitimacy of copyright law. If consumers are to respect copyright law, increasing sanctions for infringement without enhancing access and competition in legitimate distribution channels could be dangerously counter-productive. We suggest that rightsholders’ best strategy for addressing infringement in Australia at this time is to ensure that Australians can access copyright goods in a timely, affordable, convenient, and fair lawful manner.
Resumo:
This thesis introduces a theory of intellectual property (IP) law informed by Islamic Shari'a. The sources and objectives of Islamic Shari'a support the theoretical framework underpinning IP laws. However, they strongly emphasise the importance of development goals in intellectual property policy making. This thesis argues that an optimal IP system from an Islamic perspective shall not overprotect IP holders but should instead endeavor to empower people to access knowledge resources to enhance access to education, public health and economic opportunities. Taking Libya as a case study, this thesis makes recommendations for the improvement of IP law that have important broader implications for developing countries.
Resumo:
The travel and tourism industry has come to rely heavily on information and communication technologies to facilitate relations with consumers. Compiling consumer data profiles has become easier and it is widely thought that consumers place great importance on how that data is handled by firms. Lack of trust may cause consumers to have privacy concerns and may, in turn, have an adverse impact on consumers’ willingness to purchase online. Three specific aspects of privacy that have received attention from researchers are unauthorized use of secondary data, invasion of privacy, and errors. A survey study was undertaken to examine the effects of these factors on both prior purchase of travel products via the Internet and future purchase probability. Surprisingly, no significant relationships were found to indicate that such privacy concerns affect online purchase behavior within the travel industry. Implications for managers are discussed.
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Resumo:
Purpose: The therapeutic ratio for ionising radiation treatment of tumour is a trade-off between normal tissue side-effects and tumour control. Application of a radioprotector to normal tissue can reduce side-effects. Here we study the effects of a new radioprotector on the cellular response to radiation. Methylproamine is a DNA-binding radioprotector which, on the basis of published pulse radiolysis studies, acts by repair of transient radiation-induced oxidative species on DNA. To substantiate this hypothesis, we studied protection by methylproamine at both clonogenic survival and radiation-induced DNA damage, assessed by γH2AX (histone 2AX phosphorylation at serine 139) focus formation endpoints. Materials and methods: The human keratinocyte cell line FEP1811 was used to study clonogenic survival and yield of γH2AX foci following irradiation (137Cs γ-rays) of cells exposed to various concentrations of methylproamine. Uptake of methylproamine into cell nuclei was measured in parallel. Results: The extent of radioprotection at the clonogenic survival endpoint increased with methylproamine concentration up to a maximum dose modification factor (DMF) of 2.0 at 10 μM. At least 0.1 fmole/nucleus of methylproamine is required to achieve a substantial level of radioprotection (DMF of 1.3) with maximum protection (DMF of 2.0) achieved at 0.23 fmole/nucleus. The γH2AX focus yield per cell nucleus 45 min after irradiation decreased with drug concentration with a DMF of 2.5 at 10 μM. Conclusions: These results are consistent with the hypothesis that radioprotection by methylproamine is mediated by attenuation of the extent of initial DNA damage.
Resumo:
This thesis examines perceptions of advertising on social networking sites (SNS), in particular consumers' privacy concerns, advertising engagement and advertising avoidance. It contributes to the understanding of social media by providing results of a longitudinal investigation of consumer perceptions of advertising, a topography of engagement and avoidance triggers and a three dimensional model of advertising avoidance on SNS. This research used a mixed methodology, employing Critical Incident Technique, In-depth interviews and online surveys.
Resumo:
A home embodies a sensorial space that is layered with personal memories and traces of history. The success of a home in providing a strong sense of place depends on various factors such as geographical location, climatic conditions, and occupants’ world-views and perceptions. This paper explores Muslims’ perceptions of privacy, modesty and hospitality within their homes through their lived experiences. This case study focuses on three Muslim families living in Australian designed homes within the same suburb of Brisbane, Australia. The study provides prefatory insight into the ways in which these families perform their daily activities and entertain their guests without jeopardizing their privacy needs. The study examines the significance of modesty in the design of Muslim homes as a means by which family members are able to achieve optimum privacy while simultaneously extending hospitality to guests inside and outside their homes. The findings of this study provide opportunities too, for expanding research into culturally adaptable housing systems to help meet the changing needs of Australian multicultural society.
Resumo:
A new era of visible and sharable electricity information is emerging. Where eco-feedback is installed, households can now visualise many aspects of their energy consumption and share this information with others through Internet platforms such as social media. Despite providing users with many affordances, eco-feedback information can make public previously private actions from within the intimate setting of the family home. This paper represents a study focussing specifically on the privacy aspects of nascent ways for viewing and sharing this new stream of personal information. It explores the nuances of privacy related to eco-feedback both within and beyond the family home. While electricity consumption information may not be considered private itself, the household practices which eco-feedback systems makes visible may be private. We show that breaches of privacy can occur in unexpected ways and have the potential to cause distress. The paper concludes with some suggestions for how to realise the benefits of sharing energy consumption information whist effectively maintaining individuals’ conceptions of adequate privacy.