892 resultados para D82 - Asymmetric and Private Information
Resumo:
Although in the late 1990s there was much discussion as to whether the idea of information literacy was necessary or had longevity, global interest in the phenomenon has increased rather than diminished. In the midst of all this activity, what has happened to the way in which we interpret the idea of information literacy in the last decade or more? The label of information literacy has certainly become widely applied, especially to library based programs and remains more popular in formal learning environments.Ultimately information literacy is about peoples’ experience of using information wherever they happen to be. Information literacy is about people interacting, engaging, working with information in many contexts, either individually or in community. Emerging technologies may transform the kinds of information available and how it is engaged with. Nevertheless, we continue to need to understand the experience of information use in order to support people in their information environments. We continue to need to develop programs which reflect and enhance peoples’ experiences of using information to learn in ever widening and more complex settings (Bruce, 2008; Bruce & Hughes, 2010).
Resumo:
Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.
Resumo:
Purpose - The purpose of this paper is to present a model for curricular integration of information literacy for undergraduate programs in higher education. Design/methodology/approach - Data are drawn from individual interviews at three universities in Australia and curricular integration working experience at a New Zealand university. Sociocultural theories are adopted in the research process and in the development of the model, Findings - Key characteristics of the curriculum integration of information literacy were identified and an information literacy integration model was developed. The S2J2 key behaviours for campus-wide multi-partner collaboration in information literacy integration were also identified. Research limitations/implications - The model was developed without including the employer needs. Through the process of further research, the point of view of the employer on how to provide information literacy education needs to be explored in order to strengthen the model in curricular design. Practical implications - The information literacy integration model was developed based on practical experience in higher education and has been applied in different undergraduate curricular programs. The model could be used or adapted by both librarians and academics when they integrate information literacy into an undergraduate curriculum from a lower level to a higher level. Originality/value - The information literacy integration model was developed based on recent PhD research. The model integrates curriculum, pedagogy and learning theories, information literacy theories, information literacy guidelines, people and collaborative together. The model provides a framework of how information literacy can be integrated into multiple courses across an undergraduate academic degree in higher education.
Resumo:
Understanding how IT investments contribute to business value is an important issue, and this assists in the efficient use of technology resources in businesses. While there is an agreement that IT contributes to business value, we are unsure of how IT contributes to business value in the wider context, including developing countries. With the view that understanding the interaction between IT resources and the users may provide better insights on the potential of IT investments, this study investigates the businesses’ perception of the intangible benefits of their IT investments. The results indicate that businesses in developing countries perceive that their IT investments provide intangible benefits, especially at the process level, and this contributes to business value.
Resumo:
Privacy issues have hindered the evolution of e-health since its emergence. Patients demand better solutions for the protection of private information. Health professionals demand open access to patient health records. Existing e-health systems find it difficult to fulfill these competing requirements. In this paper, we present an information accountability framework (IAF) for e-health systems. The IAF is intended to address privacy issues and their competing concerns related to e-health. Capabilities of the IAF adhere to information accountability principles and e-health requirements. Policy representation and policy reasoning are key capabilities introduced in the IAF. We investigate how these capabilities are feasible using Semantic Web technologies. We discuss with the use of a case scenario, how we can represent the different types of policies in the IAF using the Open Digital Rights Language (ODRL).
Resumo:
The rapid growth in the number of users using social networks and the information that a social network requires about their users make the traditional matching systems insufficiently adept at matching users within social networks. This paper introduces the use of clustering to form communities of users and, then, uses these communities to generate matches. Forming communities within a social network helps to reduce the number of users that the matching system needs to consider, and helps to overcome other problems from which social networks suffer, such as the absence of user activities' information about a new user. The proposed system has been evaluated on a dataset obtained from an online dating website. Empirical analysis shows that accuracy of the matching process is increased using the community information.
Resumo:
Experts’ views and commentary have been highly respected in every discipline. However, unlike traditional disciplines like medicine, mathematics and engineering, Information System (IS) expertise is difficult to define. Despite seeking expert advice and views is common in the areas of IS project management, system implementations and evaluations. This research-in-progress paper attempts to understand the characteristics of IS-expert through a comprehensive literature review of analogous disciplines and then derives a formative research model with three main constructs. A validated construct of expertise of IS will have a wide range of implications for research and practice.
Resumo:
Mandatory data breach notification laws have been a significant legislative reform in response to unauthorized disclosures of personal information by public and private sector organizations. These laws originated in the state-based legislatures of the United States during the last decade and have subsequently garnered worldwide legislative interest. We contend that there are conceptual and practical concerns regarding mandatory data breach notification laws which limit the scope of their applicability, particularly in relation to existing information privacy law regimes. We outline these concerns here, in the light of recent European Union and Australian legal developments in this area.
Resumo:
China continues to face great challenges in meeting the health needs of its large population. The challenges are not just lack of resources, but also how to use existing resources more efficiently, more effectively, and more equitably. Now a major unaddressed challenge facing China is how to reform an inefficient, poorly organized health care delivery system. The objective of this study is to analyze the role of private health care provision in China and discuss the implications of increasing private-sector development for improving health system performance. This study is based on an extensive literature review, the purpose of which was to identify, summarize, and evaluate ideas and information on private health care provision in China. In addition, the study uses secondary data analysis and the results of previous study by the authors to highlight the current situation of private health care provision in one province of China. This study found that government-owned hospitals form the backbone of the health care system and also account for most health care service provision. However, even though the public health care system is constantly trying to adapt to population needs and improve its performance, there are many problems in the system, such as limited access, low efficiency, poor quality, cost inflation, and low patient satisfaction. Currently, private hospitals are relatively rare, and private health care as an important component of the health care system in China has received little policy attention. It is argued that policymakers in China should recognize the role of private health care provision for health system performance, and then define and achieve an appropriate role for private health care provision in helping to respond to the many challenges facing the health system in present-day China.
Resumo:
Critical incidents offer a focus for exploratory research about human experiences, including information use and information literacy learning. This paper describes how critical incidents underpinned research about international students’ use of online information resources at two Australian universities. It outlines the development and application of an expanded critical incident approach (ECIA), explaining how ECIA built upon critical incident technique (CIT) and incorporated information literacy theory. It discusses points of expansion (differences) between CIT and ECIA. While CIT initially proved useful in structuring the research, the pilot study revealed methodological limitations. ECIA allowed more nuanced data analysis and the integration of reflection. The study produced a multifaceted word picture of international students’ experience of using online information resources to learn, and a set of critical findings about their information literacy learning needs. ECIA offers a fresh approach for researching information use, information experience, evidence-based practice, information literacy and informed learning.
Resumo:
Most social network users hold more than one social network account and utilize them in different ways depending on the digital context. For example, friendly chat on Facebook, professional discussion on LinkedIn, and health information exchange on PatientsLikeMe. Thus many web users need to manage many disparate profiles across many distributed online sources. Maintaining these profiles is cumbersome, time consuming, inefficient, and leads to lost opportunity. In this paper we propose a framework for multiple profile management of online social networks and showcase a demonstrator utilising an open source platform. The result of the research enables a user to create and manage an integrated profile and share/synchronise their profiles with their social networks. A number of use cases were created to capture the functional requirements and describe the interactions between users and the online services. An innovative application of this project is in public health informatics. We utilize the prototype to examine how the framework can benefit patients and physicians. The framework can greatly enhance health information management for patients and more importantly offer a more comprehensive personal health overview of patients to physicians.
Resumo:
The World Wide Web constitutes one of the most important inventions of the late 20th century: it has changed culture, society, business, communication, politics, and many other fields of human endeavour, not least also by providing a more user-friendly pathway of access to its major underlying technology, the Internet itself. Key phases in its development can be charted, especially by how it has been used to present and share information – and here, the personal or professional, private or official homepage stands in as a useful representation of wider Web trends overall. From hand-coded beginnings through several successive stages of experimentation and standardisation, to the shifting balance between personal sites and social networks, the homepage demonstrates how the Web itself, and its place in our lives, have changed.
Resumo:
Mobile telecommunications have become a key lifestyle and technological trend of the twenty first century. In the context of increased urbanism and pressure on cites for citizen engagement for the purpose of creating good public places the potential of these technologies raises critical questions for planning professionals. Even though technology has become integral to all functions within our urban environment, little is known about perceptions and relationship between urban planners and the ubiquitous, ever-present digital layer of urban data and information. This paper explores this issue, via three focus groups and an additional follow-up interview with planners from local and state government, education and private sector. This paper explores the issues of integrating information and communication technologies into planning practice and the affordances that these technologies offer for community consultation and placemaking.
Resumo:
What are the information practices of teen content creators? In the United States over two thirds of teens have participated in creating and sharing content in online communities that are developed for the purpose of allowing users to be producers of content. This study investigates how teens participating in digital participatory communities find and use information as well as how they experience the information. From this investigation emerged a model of their information practices while creating and sharing content such as film-making, visual art work, story telling, music, programming, and web site design in digital participatory communities. The research uses grounded theory methodology in a social constructionist framework to investigate the research problem: what are the information practices of teen content creators? Data was gathered through semi-structured interviews and observation of teen’s digital communities. Analysis occurred concurrently with data collection, and the principle of constant comparison was applied in analysis. As findings were constructed from the data, additional data was collected until a substantive theory was constructed and no new information emerged from data collection. The theory that was constructed from the data describes five information practices of teen content creators. The five information practices are learning community, negotiating aesthetic, negotiating control, negotiating capacity, and representing knowledge. In describing the five information practices there are three necessary descriptive components, the community of practice, the experiences of information and the information actions. The experiences of information include information as participation, inspiration, collaboration, process, and artifact. Information actions include activities that occur in the categories of gathering, thinking and creating. The experiences of information and information actions intersect in the information practices, which are situated within the specific community of practice, such as a digital participatory community. Finally, the information practices interact and build upon one another and this is represented in a graphic model and explanation.