809 resultados para Privacy.
Resumo:
Reducing complexity in Information Systems is a main concern in both research and industry. One strategy for reducing complexity is separation of concerns. This strategy advocates separating various concerns, like security and privacy, from the main concern. It results in less complex, easily maintainable, and more reusable Information Systems. Separation of concerns is addressed through the Aspect Oriented paradigm. This paradigm has been well researched and implemented in programming, where languages such as AspectJ have been developed. However, the rsearch on aspect orientation for Business Process Management is still at its beginning. While some efforts have been made proposing Aspect Oriented Business Process Modelling, it has not yet been investigated how to enact such process models in a Workflow Management System. In this paper, we define a set of requirements that specifies the execution of aspect oriented business process models. We create a Coloured Petri Net specification for the semantics of so-called Aspect Service that fulfils these requirements. Such a service extends the capability of a Workflow Management System with support for execution of aspect oriented business process models. The design specification of the Aspect Service is also inspected through state space analysis.
Resumo:
Teleradiology allows medical images to be transmitted over electronic networks for clinical interpretation, and for improved healthcare access, delivery and standards. Although, such remote transmission of the images is raising various new and complex legal and ethical issues, including image retention and fraud, privacy, malpractice liability, etc., considerations of the security measures used in teleradiology remain unchanged. Addressing this problem naturally warrants investigations on the security measures for their relative functional limitations and for the scope of considering them further. In this paper, starting with various security and privacy standards, the security requirements of medical images as well as expected threats in teleradiology are reviewed. This will make it possible to determine the limitations of the conventional measures used against the expected threats. Further, we thoroughly study the utilization of digital watermarking for teleradiology. Following the key attributes and roles of various watermarking parameters, justification for watermarking over conventional security measures is made in terms of their various objectives, properties, and requirements. We also outline the main objectives of medical image watermarking for teleradiology, and provide recommendations on suitable watermarking techniques and their characterization. Finally, concluding remarks and directions for future research are presented.
Resumo:
Despite the significant health benefits attributed to breastfeeding, rates in countries, such as Australia, continue to remain static or to decline. Typically, the tangible support offered for women to support breastfeeding behaviours takes the form of face-to-face advice from health professionals, peer counselling via not-for-profit organizations such as the ABA, and provision of information through websites, pamphlets, and books. Prior research indicates that face-to-face support is more effective than telephone contact (Britton, McCormic, Renfrew, Wade, & King, 2009). Given the increasing costs associated with the provision of personalized face-to-face professional support and the need for some women to maximize privacy, discretion, and judgment-free consultations, there is a gap that could be filled by the use of m-technologies such as text messaging and other social media. The research team developed MumBubConnect; a two-way SMS system which combined the personalized aspects of face-to-face contact but maintained levels of privacy. The use of SMS was immediate, portable, and overcame many of the barriers associated with embarrassment. An Page 205 of 312 online survey of 130 breastfeeding mothers indicated that MumBubConnect facilitated the seeking of social support using m-technology, increased self-efficacy and maintained the desire behaviour.
Resumo:
Climate change presents risks to health that must be addressed by both decision-makers and public health researchers. Within the application of Environmental Health Impact Assessment (EHIA), there have been few attempts to incorporate climate change-related health risks as an input to the framework. This study used a focus group design to examine the perceptions of government, industry and academic specialists about the suitability of assessing the health consequences of climate change within an EHIA framework. Practitioners expressed concern over a number of factors relating to the current EHIA methodology and the inclusion of climate change-related health risks. These concerns related to the broad scope of issues that would need to be considered, problems with identifying appropriate health indicators, the lack of relevant qualitative information that is currently incorporated in assessment and persistent issues surrounding stakeholder participation. It was suggested that improvements are needed in data collection processes, particularly in terms of adequate communication between environmental and health practitioners. Concerns were raised surrounding data privacy and usage, and how these could impact on the assessment process. These findings may provide guidance for government and industry bodies to improve the assessment of climate change-related health risks.
Resumo:
Technologies such as smart meters and electricity feedback are becoming an increasingly compelling focus for HCI researchers in light of rising power prices and peak demand. We argue, however, that a pre-occupation with the goal of demand management has limited the scope of design for these technologies. In this paper we present our work-in-progress investigating the potential value of socially sharing electricity information as a means of broadening the scope of design for these devices. This paper outlines some preliminary findings gathered from a design workshop and a series of qualitative interviews with householders in Brisbane, Australia, regarding their attitudes towards electricity feedback and sharing consumption information. Preliminary findings suggest that; (1) the social sharing of electricity feedback information has the potential to be of value in better informing consumption decisions, however; (2) the potential for sharing may be constrained by attitudes towards privacy, trust and the possibility of misinformation being shared. We conclude by outlining ideas for our future research on this topic and invite comments on these ideas.
Resumo:
Open Educational Resources (OER) are teaching, learning and research materials that have been released under an open licence that permits online access and re-use by others. The 2012 Paris OER Declaration encourages the open licensing of educational materials produced with public funds. Digital data and data sets produced as a result of scientific and non-scientific research are an increasingly important category of educational materials. This paper discusses the legal challenges presented when publicly funded research data is made available as OER, arising from intellectual property rights, confidentiality and information privacy laws, and the lack of a legal duty to ensure data quality. If these legal challenges are not understood, addressed and effectively managed, they may impede and restrict access to and re-use of research data. This paper identifies some of the legal challenges that need to be addressed and describes 10 proposed best practices which are recommended for adoption to so that publicly funded research data can be made available for access and re-use as OER.
Resumo:
This paper presents Capital Music, a mobile application enabling real-time sharing of song choices with collocated urban dwellers. Due to the real-time, location-based peer-to-peer approach of the application, a user experience study was performed utilising the Wizard of Oz method. The study provides insight into how sharing non-privacy sensitive but personal data in an anonymous way can influence the user experience of people in public urban places. We discuss the findings in relation to how Capital Music influences the process of “cocooning” in public urban places, the practice of designing anonymous interactions between collocated strangers, and how the sharing of song choices can create a sense of commonality between anonymous users in the urban space. The outcomes of this study are relevant for future location-based social networking applications that aim to create interactions between collocated strangers.
Resumo:
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.
Resumo:
Information privacy requirements of patients and information requirements of healthcare providers (HCP) are competing concerns. Reaching a balance between these requirements have proven difficult but is crucial for the success of eHealth systems. The traditional approaches to information management have been preventive measures which either allow or deny access to information. We believe that this approach is inappropriate for a domain such as healthcare. We contend that introducing information accountability (IA) to eHealth systems can reach the aforementioned balance without the need for rigid information control. IA is a fairly new concept to computer science, hence; there are no unambiguously accepted principles as yet. But the concept delivers promising advantages to information management in a robust manner. Accountable-eHealth (AeH) systems are eHealth systems which use IA principles as the measure for privacy and information management. AeH systems face three main impediments; technological, social and ethical and legal. In this paper, we present the AeH model and focus on the legal aspects of AeH systems in Australia. We investigate current legislation available in Australia regarding health information management and identify future legal requirements if AeH systems are to be implemented in Australia.
Resumo:
Saudi Arabia experiences housing shortage for mid and low-income families, which is caused by rapid population growth. This condition is worsened by the fact that the current housing supply has problems in meeting both sustainable requirements and cultural needs of those families. This paper aims to investigate the link between the unique conservative Saudi culture and the design of sustainable housing, while keeping the housing cost affordable for mid and low-income families. The paper is based on a review of literatures on the issues of the Islamic culture and how can they be integrated into the design process of a Saudi house. Findings from literature reveiw suggest several design requirements for accommodating the conservative Saudi Culture in low cost sustainable houses. Such requirements include the implementation of proper usage of windows, and house orientation with a courtyard inside rather than facing the main street will provide natural ventilation while maintaining privacy. The main contribution to the body of knowledge is that this is a new approach to sustainable housing in Saudi Arabia considering not only energy use and architectural design issues but also socio-cultural issues as an essential part of sustainability.
Resumo:
Knowing, measuring and understanding media audiences have become a multi-billion dollar business. But the convention that underpins that business, audience ratings, is in crisis. Rating the Audience is the first book to show why and how audience ratings research became a convention, an agreement, and the first to interrogate the ways that agreement is now under threat. Taking a historical approach, the book looks at the evolution of audience ratings and the survey industry. It goes on to analyse today's media environment, looking at the role of the internet and the increased difficulties it presents for measuring audiences. The book covers all the major players and controversies, such as Facebook's privacy rulings and Google's alliance with Nielsen. Offering the first real comparative study, it will be critical for media students and professionals.
Resumo:
The article discusses the recent developments on Freedom of Information or FOI in Queensland. It mentions the recent calls for a new FOI model, pointing to a radical departure from the old FOI template and the emergence of a significantly different FOI regime. Two of these reforms are the Right to Information Bill 2009 or RTI and the Information Privacy Bill 2009 or IP. It also mentions the new FOI Public Interest Test under the RTI Act.
Resumo:
Mandatory data breach notification laws are a novel statutory solution in relation to organizational protections of personal information. They require organizations which have suffered a breach of security involving personal information to notif'y those persons whose information may have been affected. These laws originated in the state based legislatures of the United States during the last decade and have subsequently garnered worldwide legislative interest. Despite their perceived utility, mandatory data breach notification laws have several conceptual and practical concems that limit the scope of their applicability, particularly in relation to existing information privacy law regimes. We outline these concerns, and in doing so, we contend that while mandatory data breach notification laws have many useful facets, their utility as an 'add-on' to enhance the failings of current information privacy law frameworks should not necessarily be taken for granted.
Resumo:
Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user susceptibility to attacks. In this work, we examine whether computer or security expertise affects use of web browser security indicators. Our study takes place in the context of web-based single sign-on, in which a user can use credentials from a single identity provider to login to many relying websites; single sign-on is a more complex, and hence more difficult, security task for users. In our study, we used eye trackers and surveyed participants to examine the cues individuals use and those they report using, respectively. Our results show that users with security expertise are more likely to self-report looking at security indicators, and eye-tracking data shows they have longer gaze duration at security indicators than those without security expertise. However, computer expertise alone is not correlated with recorded use of security indicators. In survey questions, neither experts nor novices demonstrate a good understanding of the security consequences of web-based single sign-on.
Resumo:
Objectives: This qualitative study canvassed residents' perceptions of the needs and barriers to the expression of sexuality in long-term care. Methods: Sixteen residents, including five with dementia, from six aged care facilities in two Australian states were interviewed. Data were analysed using a constant comparative method. Results: Four categories describe residents' views about sexuality, their needs and barriers to its expression: ‘It still matters’; ‘Reminiscence and resignation’, ‘It's personal’, and ‘It's an unconducive environment’. Discussion: Residents, including those with dementia, saw themselves as sexual beings and with a continuing need and desire to express their sexuality. The manner in which it was expressed varied. Many barriers to sexual expression were noted, including negative attitudes of staff, lack of privacy and limited opportunities for the establishment of new relationships or the continuation of old ones. Interviewees agreed that how a resident expressed their sexuality was their business and no one else's.