742 resultados para privacy enhancing technologies
Resumo:
This research paper reports the findings from an international survey of fieldwork practitioners on their use of technology to enhance fieldwork teaching and learning. It was found that there was high information technology usage before and after time in the field, but some were also using portable devices such as smartphones and global positioning system whilst out in the field. The main pedagogic reasons cited for the use of technology were the need for efficient data processing and to develop students' technological skills. The influencing factors and barriers to the use of technology as well as the importance of emerging technologies are discussed.
Resumo:
Background: Personalised nutrition (PN) may provide major health benefits to consumers. A potential barrier to the uptake of PN is consumers’ reluctance to disclose sensitive information upon which PN is based. This study adopts the privacy calculus to explore how PN service attributes contribute to consumers’ privacy risk and personalisation benefit perceptions. Methods: Sixteen focus groups (n = 124) were held in 8 EU countries and discussed 9 PN services that differed in terms of personal information, communication channel, service provider, advice justification, scope, frequency, and customer lock-in. Transcripts were content analysed. Results: The personal information that underpinned PN contributed to both privacy risk perception and personalisation benefit perception. Disclosing information face-to-face mitigated the perception of privacy risk and amplified the perception of personalisation benefit. PN provided by a qualified expert and justified by scientific evidence increased participants’ value perception. Enhancing convenience, offering regular face-to face support, and employing customer lock-in strategies were perceived as beneficial. Conclusion: This study suggests that to encourage consumer adoption, PN has to account for face-to-face communication, expert advice providers, support, a lifestyle-change focus, and customised offers. The results provide an initial insight into service attributes that influence consumer adoption of PN.
Resumo:
In recent decades, library associations have advocated for the adoption of privacy and confidentiality policies as practical support to the Library Code of Ethics with a threefold purpose to (1) define and uphold privacy practices within the library, (2) convey privacy practices to patrons and, (3) protect against potential liability and public relations problems. The adoption of such policies has been instrumental in providing libraries with effective responses to surveillance initiatives such as warrantless requests and the USA PATRIOT ACT. Nevertheless, as reflected in recent news stories, the rapid emergence of data brokerage relationships and technologies and the increasing need for libraries to utilize third party vendor services have increased opportunities for data surveillers to access patrons’ personal information and reading habits, which are funneled and made available through multiple online library service platforms. Additionally, the advice that libraries should “contract for the same level of privacy reflected in their privacy policies” is no longer realistic given that the existence of multiple vendor contracts negotiated at arms length is likely to produce varying privacy terms and even varying definitions of what constitutes personal information (PII). These conditions sharply threaten the effectiveness and relevance of library privacy policies and privacy initiatives in that such policies increasingly offer false comfort by failing to reflect privacy weaknesses in the data sharing landscape and vendor contracts when library-vendor contracts fail to keep up with vendor data sharing capabilities. While some argue that library privacy ethics are antiquated and rendered obscure in the current online sharing economy PEW studies point to pronounced public discomfort with increasing privacy erosion. At the same time, new directions in FTC enforcement raise the possibility that public institutions’ privacy policies may serve as swords to unfair or deceptive commercial trade practices – offering the potential of renewed relevance for library privacy and confidentiality policies. This dual coin of public concern and the potential for enhanced FTC enforcement suggests that when crafting privacy polices libraries must now walk the knife’s edge by offering patrons both realistic notice about the limitations of protections the library can ensure while at the same time publicly holding vendors accountable to library privacy ethics and expectations. Potential solutions for how to walk this edge are developed and offered as a subject for further discussion to assist the modification of model policies for both public and academic libraries alike.
Resumo:
Includes bibliography
Resumo:
The Internet of Things (IoT) is the next industrial revolution: we will interact naturally with real and virtual devices as a key part of our daily life. This technology shift is expected to be greater than the Web and Mobile combined. As extremely different technologies are needed to build connected devices, the Internet of Things field is a junction between electronics, telecommunications and software engineering. Internet of Things application development happens in silos, often using proprietary and closed communication protocols. There is the common belief that only if we can solve the interoperability problem we can have a real Internet of Things. After a deep analysis of the IoT protocols, we identified a set of primitives for IoT applications. We argue that each IoT protocol can be expressed in term of those primitives, thus solving the interoperability problem at the application protocol level. Moreover, the primitives are network and transport independent and make no assumption in that regard. This dissertation presents our implementation of an IoT platform: the Ponte project. Privacy issues follows the rise of the Internet of Things: it is clear that the IoT must ensure resilience to attacks, data authentication, access control and client privacy. We argue that it is not possible to solve the privacy issue without solving the interoperability problem: enforcing privacy rules implies the need to limit and filter the data delivery process. However, filtering data require knowledge of how the format and the semantics of the data: after an analysis of the possible data formats and representations for the IoT, we identify JSON-LD and the Semantic Web as the best solution for IoT applications. Then, this dissertation present our approach to increase the throughput of filtering semantic data by a factor of ten.
Resumo:
Resource management is of paramount importance in network scenarios and it is a long-standing and still open issue. Unfortunately, while technology and innovation continue to evolve, our network infrastructure system has been maintained almost in the same shape for decades and this phenomenon is known as “Internet ossification”. Software-Defined Networking (SDN) is an emerging paradigm in computer networking that allows a logically centralized software program to control the behavior of an entire network. This is done by decoupling the network control logic from the underlying physical routers and switches that forward traffic to the selected destination. One mechanism that allows the control plane to communicate with the data plane is OpenFlow. The network operators could write high-level control programs that specify the behavior of an entire network. Moreover, the centralized control makes it possible to define more specific and complex tasks that could involve many network functionalities, e.g., security, resource management and control, into a single framework. Nowadays, the explosive growth of real time applications that require stringent Quality of Service (QoS) guarantees, brings the network programmers to design network protocols that deliver certain performance guarantees. This thesis exploits the use of SDN in conjunction with OpenFlow to manage differentiating network services with an high QoS. Initially, we define a QoS Management and Orchestration architecture that allows us to manage the network in a modular way. Then, we provide a seamless integration between the architecture and the standard SDN paradigm following the separation between the control and data planes. This work is a first step towards the deployment of our proposal in the University of California, Los Angeles (UCLA) campus network with differentiating services and stringent QoS requirements. We also plan to exploit our solution to manage the handoff between different network technologies, e.g., Wi-Fi and WiMAX. Indeed, the model can be run with different parameters, depending on the communication protocol and can provide optimal results to be implemented on the campus network.
Resumo:
When it comes to platform sustainability, mitigating user privacy concerns and enhancing trust represent two major tasks providers of Social Networking Sites (SNSs) are facing today. State-of-the-art research advocates reliance on the justice-based measures as possible means to address these challenges. However, as providers are increasingly expanding into foreign markets, the effectiveness of these measures in a cross-cultural setting is questioned. In an attempt to address this set of issues, in this study we build on the existing model to examine the impact of culture on the robustness of four justice-based means in mitigating privacy concerns and ensuring trust. Survey responses from German and Russian SNS members are used to evaluate the two structural equation models, which are then compared. We find that perceptions regarding Procedural and Informational Justice are universally important and hence should be addressed as part of the basic strategy by the SNS provider. When expanding to collectivistic countries like Russia, measures enhancing perceptions of Distributive and Interpersonal Justice can be additionally applied. Beyond practical implications, our study makes a significant contribution to the theoretical discourse on the role of culture in determining individual perceptions and behavior.
Behind the curtains of privacy calculus on social networking sites: the study of Germany and the USA
Resumo:
As social networking sites (SNSs) become increasingly global, the issues of cultural differences in participation patterns become acute. However, current research offers only limited insights into the role of culture behind SNS usage. Aiming to fill this gap, this study adopts a ‘privacy calculus’ perspective to study the differences between German and American SNS users. Results of structural equation modeling and multi-group analysis reveal distinct variability in the cognitive patterns of American and German subjects. We contribute to the theory by rejecting the universal nature of privacy-calculus processes. From a practical standpoint, our results signal that SNS providers cannot rely on the “proven” means in ensuring user participation when crossing geographic boundaries. When financial means are limited, SNS providers should direct their investments into enhancing platform enjoyment and granting users with more control and, paradoxically, lobbying for more legalistic safeguards of user privacy.
Resumo:
Salinization is a soil threat that adversely affects ecosystem services and diminishes soil functions in many arid and semi-arid regions. Soil salinity management depends on a range of factors, and can be complex expensive and time demanding. Besides taking no action, possible management strategies include amelioration and adaptation measures. The WOCAT Technologies Questionnaire is a standardized methodology for monitoring, evaluating and documenting sustainable land management practices through interaction with the stakeholders. Here we use WOCAT for the systematic analysis and evaluation of soil salinization amelioration measures, for the RECARE project Case Study in Greece, the Timpaki basin, a semi-arid region in south-central Crete where the main land use is horticulture in greenhouses irrigated by groundwater. Excessive groundwater abstractions have resulted in a drop of the groundwater level in the coastal part of the aquifer, thus leading to seawater intrusion and in turn to soil salinization due to irrigation with brackish water. Amelioration technologies that have already been applied in the case study by the stakeholders are examined and classified depending on the function they promote and/or improve. The documented technologies are evaluated for their impacts on ecosystem services, cost and input requirements. Preliminary results show that technologies which promote maintaining existing crop types while enhancing productivity and decreasing soil salinity such as composting, mulching, rain water harvesting and seed biopriming are preferred by the stakeholders. Further work will include result validation using qualitative approaches.
Resumo:
Soil salinity management can be complex, expensive, and time demanding, especially in arid and semi-arid regions. Besides taking no action, possible management strategies include amelioration and adaptation measures. Here we apply the World Overview of Conservation Approaches and Technologies (WOCAT) framework for the systematic analysis and evaluation and selection of soil salinisation amelioration technologies in close collaboration with stakeholders. The participatory approach is applied in the RECARE (Preventing and Remediating degradation of soils in Europe through Land Care) project case study of Timpaki, a semiarid region in south-central Crete (Greece) where the main land use is horticulture in greenhouses irrigated by groundwater. Excessive groundwater abstractions have resulted in a drop of the groundwater level in the coastal part of the aquifer, thus leading to seawater intrusion and in turn to soil salinisation. The documented technologies are evaluated for their impacts on ecosystem services, cost, and input requirements using a participatory approach and field evaluations. Results show that technologies which promote maintaining existing crop types while enhancing productivity and decreasing soil salinity are preferred by the stakeholders. The evaluation concludes that rainwater harvesting is the optimal solution for direct soil salinity mitigation, as it addresses a wider range of ecosystem and human well-being benefits. Nevertheless, this merit is offset by poor financial motivation making agronomic measures more attractive to users.
Resumo:
BACKGROUND Neuronavigation is an essential tool in cranial neurosurgery. Despite continuing improvements in the technologies used for neuronavigation, certain events can lead to unacceptable mismatches. To provide the best possible outcome for the patients, surgeons need to do everything possible to reduce mismatches. METHODS AND RESULTS Some simple techniques can greatly improve neuronavigation accuracy and patient safety. We describe two simple methods that were developed or refined in the Department of Neurosurgery at Inselspital, Bern, Switzerland: the transdermal navigation landmark and use of bone screws for co-registration. CONCLUSIONS Both techniques are easy to use, do not require expensive additional instruments, and are helpful in procedures involving neuronavigation.
Resumo:
Interaction with smart objects can be accomplished with different technologies, such as tangible interfaces or touch computing, among others. Some of them require the object to be especially designed to be 'smart', and some other are limited in the variety and complexity of the possible actions. This paper describes a user-smart object interaction model and prototype based on the well known event-condition-action (ECA) reasoning, which can work, to a degree, independently of the intelligence embedded into the smart object. It has been designed for mobile devices to act as mediators between users and smart objects and provides an intuitive means for personalization of object's behavior. When the user is close to an object, this one publishes its 'event & action' capabilities to the user's device. The user may accept the object's module offering, which will enable him to configure and control that object, but also its actions with respect to other elements of the environment or the virtual world. The modular ECA interaction model facilitates the integration of different types of objects in a smart space, giving the user full control of their capabilities and facilitating creative mash-uping to build customized functionalities that combine physical and virtual actions
Resumo:
While the last 50 years of agriculture have focused on meeting the food, feed, and fiber needs of humans, the challenges for the next 50 years go far beyond simply addressing the needs of an ever-growing global population. In addition to producing more food, agriculture will have to deal with declining resources like water and arable land, need to enhance nutrient density of crops, and achieve these and other goals in a way that does not degrade the environment. Biotechnology and other emerging life sciences technologies offer valuable tools to help meet these multidimensional challenges. This paper explores the possibilities afforded through biotechnology in providing improved agronomic “input” traits, differentiated crops that impart more desirable “output” traits, and using plants as green factories to fortify foods with valuable nutrients naturally rather than externally during food processing. The concept of leveraging agriculture as green factories is expected to have tremendous positive implications for harnessing solar energy to meet fiber and fuel needs as well. Widespread adaptation of biotech-derived products of agriculture should lay the foundation for transformation of our society from a production-driven system to a quality and utility-enhanced system.
Resumo:
Mentre navighiamo siamo veramente certi che i nostri dati e la nostra privacy siano al sicuro? I browser e le tecnologie di cui fanno uso possono rivelare una miriade di informazioni. Al crescere delle informazioni reperibili, si inizia a superare una massa critica che può permettere l'identificazione. Il device fingerprinting è proprio il rilevamento di questa tipologia di dati. HTML5 e le nuove API che esso mette a disposizione aumentano a dismisura le modalità per fare fingerprinting. Durante lo sviluppo della presente tesi è stato realizzato un framework molto potente che verrà mostrato nel dettaglio. Come a seguito di un disastro aereo, l'ingegneria aeronautica si mette all'opera per scovare i punti deboli allo scopo di rendere più robusti gli aerei di nuova generazione, noi con la presente tesi vogliamo dare il nostro contributo al miglioramento del web del futuro. Affinchè la nostra privacy sia veramente nelle nostre mani e possiamo essere artefici del nostro domani.
Resumo:
Este artigo é parte do relatório Cybersecurity Are We Ready in Latin America and the Caribbean?