900 resultados para Information privacy law


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this study was to assess the knowledge of public school administrators with respect to special education (ESE) law. The study used a sample of 220 public school administrators. A survey instrument was developed consisting of 19 demographic questions and 20 situational scenarios. The scenarios were based on ESE issues of discipline, due process (including IEP procedures), identification, evaluation, placement, and related services. The participants had to decide whether a violation of the ESE child's rights had occurred by marking: (a) Yes, (b) No, or (c) Undecided. An analysis of the scores and demographic information was done using a two-way analysis of variance, chi-square, and crosstabs after a 77% survey response rate.^ Research questions addressed the administrators' overall level of knowledge. Comparisons were made between principals and assistant principals and differences between the levels of schooling. Exploratory questions were concerned with ESE issues deemed problematic by administrators, effects of demographic variables on survey scores, and the listing of resources utilized by administrators to access ESE information.^ The study revealed: (a) a significant difference was found when comparing the number of ESE courses taken and the score on the survey, (b) the top five resources of ESE information were the region office, school ESE department chairs, ESE teachers, county workshops, and county inservices, (c) problematic areas included discipline, evaluation procedures, placement issues, and IEP due process concerns, (d) administrators as a group did not exhibit a satisfactory knowledge of ESE law with a mean score of 12 correct and 74% of responding administrators scoring in the unsatisfactory level (below 70%), (e) across school levels, elementary administrators scored significantly higher than high school administrators, and (f) a significant implication that assistant principals consistently scored higher than principals on each scenario with a significant difference at the high school level.^ The study reveals a vital need for administrators to receive additional preparation in order to possess a basic understanding of ESE school law and how it impacts their respective schools and school districts so that they might meet professional obligations and protect the rights of all individuals involved. Recommendations for this additional administrative preparation and further research topics were discussed. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Title 1 of the Americans with Disabilities Act (ADA) requires all employers, public and private, with more than fifteen employees to provide reasonable accommodation to qualified individuals with disabilities if the accommodation would, within limits, allow the individual to perform the essential functions of the job. Seven years after Congress enacted the law and five years after the initial provisions became effective, little information is available about the experience of organizations faced with requests for workplace accommodation.^ The question addressed in this study is: How are organizations responding to the ADA mandate to fit individuals with psychiatric disabilities in the workplace? The data sources are three organizations that allowed access to this sensitive information, and a fourth that had two disability discrimination charges filed against it.^ A brute-force case method approach applied to the four organizations yields the following information: Attorneys are hesitant to allow inquiry into company policy owing to fear of litigation; workers are not disclosing and requesting accommodation; tacit accommodation of long-standing employees appears to be a regular practice; knowledge of the intent of the ADA makes a difference in terms of equality of treatment; and insensitivity to employee privacy results in an adversarial situation.^ Implications are relevant to the need to improve lines of communication between human resource, EEO, supervisory, and legal staff; consequences of failure to address accommodations on an explicit level; need for better understanding of the availability and use of outside resources for achieving accommodation; and improvement of self-advocacy and disclosure by the employees with disabilities. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research pursued the conceptualization and real-time verification of a system that allows a computer user to control the cursor of a computer interface without using his/her hands. The target user groups for this system are individuals who are unable to use their hands due to spinal dysfunction or other afflictions, and individuals who must use their hands for higher priority tasks while still requiring interaction with a computer. ^ The system receives two forms of input from the user: Electromyogram (EMG) signals from muscles in the face and point-of-gaze coordinates produced by an Eye Gaze Tracking (EGT) system. In order to produce reliable cursor control from the two forms of user input, the development of this EMG/EGT system addressed three key requirements: an algorithm was created to accurately translate EMG signals due to facial movements into cursor actions, a separate algorithm was created that recognized an eye gaze fixation and provided an estimate of the associated eye gaze position, and an information fusion protocol was devised to efficiently integrate the outputs of these algorithms. ^ Experiments were conducted to compare the performance of EMG/EGT cursor control to EGT-only control and mouse control. These experiments took the form of two different types of point-and-click trials. The data produced by these experiments were evaluated using statistical analysis, Fitts' Law analysis and target re-entry (TRE) analysis. ^ The experimental results revealed that though EMG/EGT control was slower than EGT-only and mouse control, it provided effective hands-free control of the cursor without a spatial accuracy limitation, and it also facilitated a reliable click operation. This combination of qualities is not possessed by either EGT-only or mouse control, making EMG/EGT cursor control a unique and practical alternative for a user's cursor control needs. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In response to the recent wide-scale applications of lnformation Technology (I/T) in the hospitality industry, this study analyzed articles in leading hospitality research journals, including the International Journal of Hospitality Management, Cornell Hotel and Restaurant Administration Quarterly, and the Journal of Hospitality & Tourism Research published in the period 1985 to 2004. A total of 1,896 full-length papers were published in these journals during the study period. Excluding book reviews, research notes, and comments from editors and readers, 130 full-length IT-related papers were identified. These papers were then grouped into six defined categories of IT. The findings revealed that during the entire study period, the largest number of publications were in general business applications, whereas the highest growth rate from the first decade to the second decade were in articles on networking

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this research was to study the nutritional status of United States Coast Guard Law Enforcement Detachment (USCG/ LEDET) personnel before and after prolonged travel at sea. To date there is no information available regarding the nutritional status of Coast Guard personnel. Forty-seven subjects were studied in total, each served as their own control. Demographic and health history data was collected at baseline. Dietary and exercise data was collected before and during the deployment. Body composition was determined before and after a deployment. The results of this study revealed that the USCG/LEDET personnel had high cholesterol and decreased fiber intakes. Cholesterol intake during deployment (516.8±239.7 mg/day) was significantly higher (p= 0. 047) than pre-deployment (448.2 ± 144.3 mg/day). Fiber intake was significantly lower than recommended (p The results of this study indicate that LEDET personnel are put at higher nutritional risk while deployed and also have increased negative health behaviors associated with risk for Cardiovascular Disease (CVD) and other related diseases. This is crucial information for the USCG so that action can be taken to improve the physical well being of their personnel.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: Information seeking is an important coping mechanism for dealing with chronic illness. Despite a growing number of mental health websites, there is little understanding of how patients with bipolar disorder use the Internet to seek information. Methods: A 39 question, paper-based, anonymous survey, translated into 12 languages, was completed by 1222 patients in 17 countries as a convenience sample between March 2014 and January 2016. All patients had a diagnosis of bipolar disorder from a psychiatrist. Data were analyzed using descriptive statistics and generalized estimating equations to account for correlated data. Results: 976 (81 % of 1212 valid responses) of the patients used the Internet, and of these 750 (77 %) looked for information on bipolar disorder. When looking online for information, 89 % used a computer rather than a smartphone, and 79 % started with a general search engine. The primary reasons for searching were drug side effects (51 %), to learn anonymously (43 %), and for help coping (39 %). About 1/3 rated their search skills as expert, and 2/3 as basic or intermediate. 59 % preferred a website on mental illness and 33 % preferred Wikipedia. Only 20 % read or participated in online support groups. Most patients (62 %) searched a couple times a year. Online information seeking helped about 2/3 to cope (41 % of the entire sample). About 2/3 did not discuss Internet findings with their doctor. Conclusion: Online information seeking helps many patients to cope although alternative information sources remain important. Most patients do not discuss Internet findings with their doctor, and concern remains about the quality of online information especially related to prescription drugs. Patients may not rate search skills accurately, and may not understand limitations of online privacy. More patient education about online information searching is needed and physicians should recommend a few high quality websites.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The protection of cyberspace has become one of the highest security priorities of governments worldwide. The EU is not an exception in this context, given its rapidly developing cyber security policy. Since the 1990s, we could observe the creation of three broad areas of policy interest: cyber-crime, critical information infrastructures and cyber-defence. One of the main trends transversal to these areas is the importance that the private sector has come to assume within them. In particular in the area of critical information infrastructure protection, the private sector is seen as a key stakeholder, given that it currently operates most infrastructures in this area. As a result of this operative capacity, the private sector has come to be understood as the expert in network and information systems security, whose knowledge is crucial for the regulation of the field. Adopting a Regulatory Capitalism framework, complemented by insights from Network Governance, we can identify the shifting role of the private sector in this field from one of a victim in need of protection in the first phase, to a commercial actor bearing responsibility for ensuring network resilience in the second, to an active policy shaper in the third, participating in the regulation of NIS by providing technical expertise. By drawing insights from the above-mentioned frameworks, we can better understand how private actors are involved in shaping regulatory responses, as well as why they have been incorporated into these regulatory networks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This chapter examines the legal concept of summary in terms of its potential legal liability and other types of risks under EU and US disclosure laws.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article deals with several international instruments which provide legal guarantees for media diversity, which is essential for the promotion of cultural diversity. Based on several articles of the Convention of cultural diversity, the General Comment of the Committee on Economic, Social and Cultural Rights No. 21 on the right to take part in cultural life, as well as the work of the UN Independent Expert on Cultural Rights, this article aims to identify legal tools for the establishing of measures promoting cultural diversity in the media. This article looks at the case study of Honduran Garifuna community radios. It emphasizes the importance of taking into account the economic aspects of cultural and communicational rights.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper aims to analyse a sample of Galician co-ops to verify whether or not it is possible to deduce different financial behaviours among co-op partners from the amount of net-surplus. To this end, our study adds net-surplus to the variation registered in some account entries so that other residual incomes yielded by the co-op may be considered. The distribution of these revenues shows that partners do not usually choose to fully anticipate residual incomes. This reveals that some firms follow a positive net-surplus strategy, which is actually different from the null net-surplus strategy asserted by the classical financial theory. Furthermore, results show that differences between both strategies are statistically significant. This opens a path to future research on determinants explaining why co-op partners voluntarily renounce to anticipating these residual incomes. Such behaviour only arises when yearly accounts render a positive result, thereby making the accounting net-surplus a useful tool to analyse financial information in co-op societies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Abstract: In the mid-1990s when I worked for a telecommunications giant I struggled to gain access to basic geodemographic data. It cost hundreds of thousands of dollars at the time to simply purchase a tile of satellite imagery from Marconi, and it was often cheaper to create my own maps using a digitizer and A0 paper maps. Everything from granular administrative boundaries to right-of-ways to points of interest and geocoding capabilities were either unavailable for the places I was working in throughout Asia or very limited. The control of this data was either in a government’s census and statistical bureau or was created by a handful of forward thinking corporations. Twenty years on we find ourselves inundated with data (location and other) that we are challenged to amalgamate, and much of it still “dirty” in nature. Open data initiatives such as ODI give us great hope for how we might be able to share information together and capitalize not only in the crowdsourcing behavior but in the implications for positive usage for the environment and for the advancement of humanity. We are already gathering and amassing a great deal of data and insight through excellent citizen science participatory projects across the globe. In early 2015, I delivered a keynote at the Data Made Me Do It conference at UC Berkeley, and in the preceding year an invited talk at the inaugural QSymposium. In gathering research for these presentations, I began to ponder on the effect that social machines (in effect, autonomous data collection subjects and objects) might have on social behaviors. I focused on studying the problem of data from various veillance perspectives, with an emphasis on the shortcomings of uberveillance which included the potential for misinformation, misinterpretation, and information manipulation when context was entirely missing. As we build advanced systems that rely almost entirely on social machines, we need to ponder on the risks associated with following a purely technocratic approach where machines devoid of intelligence may one day dictate what humans do at the fundamental praxis level. What might be the fallout of uberveillance? Bio: Dr Katina Michael is a professor in the School of Computing and Information Technology at the University of Wollongong. She presently holds the position of Associate Dean – International in the Faculty of Engineering and Information Sciences. Katina is the IEEE Technology and Society Magazine editor-in-chief, and IEEE Consumer Electronics Magazine senior editor. Since 2008 she has been a board member of the Australian Privacy Foundation, and until recently was the Vice-Chair. Michael researches on the socio-ethical implications of emerging technologies with an emphasis on an all-hazards approach to national security. She has written and edited six books, guest edited numerous special issue journals on themes related to radio-frequency identification (RFID) tags, supply chain management, location-based services, innovation and surveillance/ uberveillance for Proceedings of the IEEE, Computer and IEEE Potentials. Prior to academia, Katina worked for Nortel Networks as a senior network engineer in Asia, and also in information systems for OTIS and Andersen Consulting. She holds cross-disciplinary qualifications in technology and law.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-08